Solving the Challenges of Modern Investigations
Every modern investigation requires collecting, correlating and verifying multiple types of information, across multiple online environments. Our tools simplify this process by allowing repetitive queries and drill down on typical types of data found to speed conclusions and decisions.
- Malware Artifacts
- Query, Correlate & Visualize Proofpoint ET
- Aliases & Connections
- Search & Visualize Social Media
- Real-Time Situational Awareness
- OSINT, Deep & Dark Web Monitoring
- History of Activities
- ShadowDragon & Decade Defacement Database
- IP Addresses & Identities
- Stealthily Engage Directly with Target
Supporting Your Process
Strengthen your investigative process by leveraging knowledge from our experts who have worked on long term criminal investigations using ShadowDragon tools.Learn More
Speed your process by easily converting Maltego graphs to I2, Palantir, CSV or secure transmission file types with one click.Learn More
Use our API to integrate our tools with existing or new link analysis platforms and security orchestration tools.
Speed up your online intelligence gathering by automating manual research tasks. We can customize transform sets to uniquely support your investigations.
Tools to Amplify In-House Capabilities
Our threat detection tools are designed to augment your team’s capability to collect and analyze data quickly. We help you to be independent with just the tools and training – no ongoing services or reports.
Born and Based in the USA
ShadowDragon tools were born, tested and refined by our sister company Packet Ninjas, a U.S.-based cyber security consulting firm.
Proven in Global Investigations
Our digital investigation tools were developed to expedite complex investigations. They are mature, reliable and designed to overcome the challenges of multi-environment and multi-technology fact finding.
Collect, Correlate, Verify, Repeat
ShadowDragon tools were developed to support an investigative process where drill downs need to be repeated and distilled across multiple sources as new artifacts are discovered.
I've been exposed to many technologies working for the CIA and the Air Force. ShadowDragon social media and online monitoring tools are the best ones that I've found to support a strong, legally defensible intelligence process.
With ShadowDragon’s SocialNet transforms, you can graph out connections across dozens of social networks with just one click. They are a must have for any investigator or hunter. It takes a lot of the time and effort out of pivoting on personal data.
With ShadowDragon's support, we offered capabilities we would have never had. We run our classes on these tools.
Our professional services need a repeatable process, ShadowDragon's toolset brings that repeatability and quality we need.
SocialNet's ability to help map out a subject's online presence as well as identify connections between subjects has been incredibly valuable for our social media-related investigations.
MalNet and SocialNet are tremendous resources for incidents investigation. They allow for unparalleled pivoting, malicious infrastructure detection and categorization and attribution.
I recently got the opportunity to use SocialNet during a human trafficking interdiction. What was once for me a manual and arduous process – i.e., navigate to first social network, search known data points of investigative target, document results, continue to next social network – became an embarrassingly easy single click. This tool doesn’t just save time. Using SocialNet for OSINT is an absolute game-changer.
These transforms are an ethical social engineer's best dream....Thanks to the ShadowDragon team.