fbpx

ShadowDragon

DeliverFund Logo

I’ve been exposed to many technologies working for the CIA and the Air Force. ShadowDragon social media and online monitoring tools are the best ones that I’ve found to support a strong, legally defensible intelligence process.

Nic McKinley Executive Director DeliverFund
Social-Engineer Logo

These transforms are an ethical social engineer's best dream....Thanks to the ShadowDragon team.

Christopher Hadnagy Chief Human Hacker Social-Engineer
Trend Micro Logo

With ShadowDragon’s SocialNet transforms, you can graph out connections across dozens of social networks with just one click. They are a must have for any investigator or hunter. It takes a lot of the time and effort out of pivoting on personal data.

Bob McArdle EMEA Manager, Threat Research Trend Micro
K2 Intelligence Logo

SocialNet's ability to help map out a subject's online presence as well as identify connections between subjects has been incredibly valuable for our social media-related investigations.

Matteo Tomasini Director K2 Intelligence
ClearSky Logo

MalNet and SocialNet are tremendous resources for incidents investigation. They allow for unparalleled pivoting, malicious infrastructure detection and categorization and attribution. The Maltego transforms, online services access and data feeds enable fuller extraction of intelligence when investigating an attack or working with malicious artifacts.

Eyal Sela Cyber Analyst ClearSky
Atlantic Data Forensics Logo

I recently got the opportunity to use SocialNet during a human trafficking interdiction. What was once for me a manual and arduous process – i.e., navigate to first social network, search known data points of investigative target, document results, continue to next social network – became an embarrassingly easy single click. This tool doesn’t just save time. Using SocialNet for OSINT is an absolute game-changer.