Maltego Penetration Testing Transforms
Switch branches/tags
Nothing to show
Clone or download
allfro Merge pull request #4 from liorbp/patch-1
fix "[Errno 111] Connection refused" after fail to run p0f for first time
Latest commit d9568dc Jul 23, 2014

Sploitego - Maltego's (Local) Partner in Crime

1.0 - Introduction

Sploitego is a local pen-test transform package that uses the Canari Framework for local transform execution in Maltego. The framework was first introduced at DEFCON 20 and has since picked up steam.

2.0 - Installing Sploitego

2.1 - Supported Platforms

Sploitego has currently been tested on Mac OS X and Linux.

2.2 - Requirements

Sploitego is only supported on Python version 2.6. The setup script will automatically download and install most of the prerequisite modules, however, some modules will still need to be installed manually. The following modules require manual installation:

Some of the transforms require external command-line tools (e.g. nmap, amap, p0f, etc.). The following command-line tools are currently supported:

2.3 - Installation

Once you've installed the necessary prerequisites, installing Sploitego is a cinch. Just run:

$ sudo python install

This will install all the necessary modules and download any dependencies (other than what's required above) automatically. Once Sploitego has been installed, it's time to install the transforms. First, make sure Maltego has been run for the first time and initialized (i.e. logged in, transforms discovered, etc.). Once initialized, shutdown Maltego and run the following command:

$ canari install-package sploitego

Contact Info

Right now we only have one contributor:

  • Nadeem Douba: @ndouba on Twitter

Contact us any time! Sploitego is currently looking for help in various areas of the project.