Maryam : Open-source Intelligence(OSINT) Framework

OWASP Maryam is an Open-source intelligence(OSINT) and Web-based Footprinting modular/tool framework based on the Recon-ng and written in Python. If you have skill in Metasploit or Recon-ng, you can easily use it without prerequisites.

Also Read – Lazydocker : The Lazier Way To Manage Everything Docker

What can be done?

If you want

  • Extracts Emails, Docs, Subdomains, Social networks from search engines
  • Extracts Links, CSS and JS files, CDN links, Emails, Keywords from Web Source
  • Find and Brute force DNS, TLD and important directs
  • Crawl Web Pages and search your RegExp
  • Identify WebApps, WAF, Interesting and important files
  • And get report with several format

Install

git clone https://github.com/saeeddhqan/Maryam.git
cd Maryam
pip install -r requirements
chmod +x maryam
./maryam

Quick Guide

For help options

  • write help or ?
  • or write help <command-name> for help your command

For show modules

  • write show modules

For use modules

  • write use <module-name> or load <module-name>

For show set options

  • write show options

For set an option

  • write set <option-name> <value>
  • for example set VERBOSITY 2

For run selected module

  • write run

For add a variable

  • write var <$name> <value>
  • for example var $hunter_key XXXXXXXXXXXXXXXX
  • for use it write set HUNTER_KEY $hunter_key
  • for show all of variables write var list command
  • for delete a variable write var delete <var-name>

For get report from modules output

  • set ‘output’ option with True: set output True
  • Or use ‘–output switch’: wapps -d domain.com --output
  • And next, use report command: report <format> <file-name-for-output> <module-name>
  • For example report <format> pdf_docs osint/docs_search localhost

For show history commands

  • write history all

For modules search

  • write search <string>

For record commands

  • write record start <file-name>
  • for stop it record stop

For store all outputs

  • write spool start <file-name>
  • for stop it spool stop

For run commands from file

  • write resource <commands-file-name>

For run shell command

  • write shell <command> or ! <command> or <command>

For reload all modules

  • write reload

For config the connections

  • see the options: show options
  • and set the options: set TIMEOUT 2.5

For use random user-agent

  • write set RAND_AGENT true
R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago