OWASP Maryam is an Open-source intelligence(OSINT) and Web-based Footprinting modular/tool framework based on the Recon-ng and written in Python. If you have skill in Metasploit or Recon-ng, you can easily use it without prerequisites.
Also Read – Lazydocker : The Lazier Way To Manage Everything Docker
What can be done?
If you want
Install
git clone https://github.com/saeeddhqan/Maryam.git
cd Maryam
pip install -r requirements
chmod +x maryam
./maryam
Quick Guide
For help options
help
or ?
help <command-name>
for help your commandFor show modules
show modules
For use modules
use <module-name>
or load <module-name>
For show set options
show options
For set an option
set <option-name> <value>
set VERBOSITY 2
For run selected module
run
For add a variable
var <$name> <value>
var $hunter_key XXXXXXXXXXXXXXXX
set HUNTER_KEY $hunter_key
var list
commandvar delete <var-name>
For get report from modules output
set output True
wapps -d domain.com --output
report
command: report <format> <file-name-for-output> <module-name>
report <format> pdf_docs osint/docs_search localhost
For show history commands
history all
For modules search
search <string>
For record commands
record start <file-name>
record stop
For store all outputs
spool start <file-name>
spool stop
For run commands from file
resource <commands-file-name>
For run shell command
shell <command>
or ! <command>
or <command>
For reload all modules
reload
For config the connections
show options
set TIMEOUT 2.5
For use random user-agent
set RAND_AGENT true
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…