Maryam – Perfect OSINT Framework
OSINT techniques are used to collect the data from publicly possible sources like Social Media Platforms etc. There are various ways to collect information. There are some automated tools that make the task easier. Maryam tool is one of the best tools which is been designed by the OWASP team and has the potential to collect information from open sources. This tool is developed in the Python language and it also comes as the package in the Python Pip. We can collect lots of information from Twitter, LinkedIn, and also from Google. This tool is also available on the GitHub platform. It’s free and open-source to use.
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux
Installation of Maryam Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/saeeddhqan/Maryam.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
cd Maryam
Step 3: You are in the directory of the Maryam. Now you have to install a dependency of the Maryam using the following command.
sudo pip install -r requirements.txt
Step 4: All the dependencies have been installed in your Kali Linux operating system.
./maryam
Working with Maryam Tool on Kali Linux OS
Example 1: Modules
show modules
In this example, we have displayed the list of available modules which the tool offers.
Example 2: Anonymous Email Grabbing – OSINT
email_search
In this example, we are using the Email Grabbing module.
email_search -q gmail.com -e bing,google,yahoo –output
We have got the email address for public sources.
Example 3: Social Nets – OSINT
social_nets
In this example, we are using the Social Nets module.
social_nets -q geeksforgeeks.org -e google,yahoo,bing
We have got the information about the geeksforgeeks username for public sources.
Example 4: Crawl Pages – Footprinting
crawl_pages
In this example, we are using the Crawl Pages module.
crawl_pages -d geeksforgeeks.org -r “https?://[A-z0-9./]+” –output
We have got the URLs that match the regex which is been provided in the query
Example 5: Getting Profiles From LinkedIn – Search
In this example, we are using the LinkedIn module.
linkedin -q geeksforgeeks -e google,bing,yahoo
We have got the link of profiles on LinkedIn which are been associated with the geeksforgeeks organization.
Example 6: Getting Profiles From Twitter – Search
In this example, we are using the Twitter module.
twitter -q geeksforgeeks -e bing,google
We have got the link of profiles on Twitter which are been associated with the geeksforgeeks organization.
Please Login to comment...