Maryam : Open-source Intelligence(OSINT) Framework

Maryam is a full-featured open-source intelligence(OSINT) framework written in Python. Complete with independent modules, built in functions, interactive help, and command completion, provides a command-line environment for used forensic and open-source intelligence(OSINT).

Maryam is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a subclass of the “module” class.

The “module” class is a customized “cmd” interpreter equipped with built-in functionality that provides simple interfaces to common tasks such as standardizing output, and making web requests.

Therefore, all the hard work has been done. Building modules is simple and takes little more than a few minutes. See the Development Guide for guide information.

Also Read – DNS Rebinding Tool : DNS Rebind Tool With Custom Scripts

What can be done

Can extract

  • Comments, Links, CDNs, CSS, JS files..
  • Documentations(pdf, doc, ..)
  • Keywords, errors, usernames, ..
  • DNS, TLD and bruteforce it.
  • SiteMap

Can identify

  • Interesting and important files
  • Emails from search engines
  • Onion related links
  • Subdomains from different sources
  • WebApps, WAF,..
  • Social networks
R K

Recent Posts

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

4 hours ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

18 hours ago

Google Dorking in Cybersecurity: A Complete Guide

Introduction In the vast ocean of the internet, the most powerful tool you already have…

1 day ago

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

2 weeks ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

2 weeks ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

2 weeks ago