Open In App

Maryam – Perfect OSINT Framework

Improve
Improve
Like Article
Like
Save
Share
Report

OSINT techniques are used to collect the data from publicly possible sources like Social Media Platforms etc. There are various ways to collect information. There are some automated tools that make the task easier. Maryam tool is one of the best tools which is been designed by the OWASP team and has the potential to collect information from open sources. This tool is developed in the Python language and it also comes as the package in the Python Pip. We can collect lots of information from Twitter, LinkedIn, and also from Google. This tool is also available on the GitHub platform. It’s free and open-source to use.

Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Installation of Maryam Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone https://github.com/saeeddhqan/Maryam.git

Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd Maryam

Step 3: You are in the directory of the Maryam. Now you have to install a dependency of the Maryam using the following command.

sudo pip install -r requirements.txt

Step 4: All the dependencies have been installed in your Kali Linux operating system.

./maryam

Working with Maryam Tool on Kali Linux OS

Example 1: Modules

show modules

In this example, we have displayed the list of available modules which the tool offers.

Example 2: Anonymous Email Grabbing – OSINT

email_search

In this example, we are using the Email Grabbing module.

email_search -q gmail.com -e bing,google,yahoo –output

We have got the email address for public sources.

Example 3: Social Nets – OSINT

social_nets

In this example, we are using the Social Nets module.

social_nets -q geeksforgeeks.org -e google,yahoo,bing

We have got the information about the geeksforgeeks username for public sources.

Example 4: Crawl Pages – Footprinting

crawl_pages

In this example, we are using the Crawl Pages module.

crawl_pages -d geeksforgeeks.org -r “https?://[A-z0-9./]+” –output

We have got the URLs that match the regex which is been provided in the query

Example 5: Getting Profiles From LinkedIn – Search

linkedin

In this example, we are using the LinkedIn module.

linkedin -q geeksforgeeks -e google,bing,yahoo

We have got the link of profiles on LinkedIn which are been associated with the geeksforgeeks organization.

Example 6: Getting Profiles From Twitter – Search

twitter

In this example, we are using the Twitter module.

twitter -q geeksforgeeks -e bing,google

We have got the link of profiles on Twitter which are been associated with the geeksforgeeks organization.


Last Updated : 15 Dec, 2021
Like Article
Save Article
Previous
Next
Share your thoughts in the comments
Similar Reads