Just go with tails on an usb thumb for privacy + OSINT tools from security distros or secured repositories (Kali was good but became to commercial, can't be trusted after certain point)
but still, either you learn how to use tons of small utilities to gather / sort / filter / clean / visualize data, or majority of professional tools require a connection / account (ex Maltego)
I have a theory there that tails is basically a target for being exploited. IDK i just find myself looking at things built like that and thinking, heck, if i were going after someone that's where i'd go to start exploiting.
oh maltego... talk about a money pit once you start getting those api keys idk who has cash for that maybe we can put a maltego in the cloud and crowd source the cost ....
Just go with tails on an usb thumb for privacy + OSINT tools from security distros or secured repositories (Kali was good but became to commercial, can't be trusted after certain point)
but still, either you learn how to use tons of small utilities to gather / sort / filter / clean / visualize data, or majority of professional tools require a connection / account (ex Maltego)
I have a theory there that tails is basically a target for being exploited. IDK i just find myself looking at things built like that and thinking, heck, if i were going after someone that's where i'd go to start exploiting.
oh maltego... talk about a money pit once you start getting those api keys idk who has cash for that maybe we can put a maltego in the cloud and crowd source the cost ....