This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Maryam Project"

From OWASP
Jump to: navigation, search
m
Line 85: Line 85:
 
   | colspan="2" align="center" | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]
 
   | colspan="2" align="center" | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]
 
   |}
 
   |}
== News and Events ==
 
  
* [https://www.blackhat.com/us-18/arsenal.html#mohammad-reza-espargham OWASP JoomScan at Blackhat Arsenal - USA 2018]
 
* JoomScan 0.0.5 - "#BHUSA" Released
 
* [http://lists.owasp.org/pipermail/owasp-leaders/2018-March/019076.html OWASP JoomScan at Blackhat Arsenal - Singapore 2018]
 
* [https://tools.kali.org/web-applications/joomscan Latest version of OWASP JoomScan added to Kali Linux repository]
 
* JoomScan 0.0.5 - "KLOT" Released
 
* JoomScan 0.0.1 - "Reborn" Released
 
* [https://www.blackhat.com/asia-18/arsenal.html#mohammad-reza-espargham OWASP Joomscan has Been Selected for Blackhat Asia Arsenal 2018]
 
  
|}
 
  
= Acknowledgements =
 
==Contributors==
 
 
joomscan source code located in github and you could see contributors in this [https://github.com/rezasp/joomscan/graphs/contributors URL].
 
 
Please feel free to fork and submit your pull request to develop joomscan Project together.
 
 
==Leader==
 
 
* [https://www.owasp.org/index.php/User:rezasp Mohammad Reza Espargham]
 
* [https://www.owasp.org/index.php/User:alirazmjoo Ali Razmjoo]
 
 
= Road Map and Getting Involved =
 
This project is going to be the best Joomla scanner, At the end We could have a joomla cms penetration tester which is updated with the last vulnerabilities.
 
 
==Roadmap==
 
 
This Project was created to be a joomscanner which already it is and now need to be best with some tasks:
 
 
* Optimize software core to be fast and easy to develop
 
* make it module base and create libraries for developers
 
* Support all OS
 
* Be update with latest exploits.
 
* Create documents for newbie users
 
* Keep testing and fix bugs!
 
 
 
===Feedback===
 
Please submit your feedbacks and issues in [https://github.com/rezasp/joomscan/issues HERE].
 
<ul>
 
<li>What do like?</li>
 
<li>What don't you like?</li>
 
<li>What features would you like to see prioritized on the roadmap?</li>
 
<li>Do you have any problem with tool?</li>
 
<li>Do you need any exploit to be add?</li>
 
</ul>
 
 
=Minimum Viable Product=
 
 
 
=Project About=
 
 
 
{{:Projects/OWASP_joomscan_Project}}
 
 
 
 
 
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->
 
__NOTOC__ <headertabs />
 
 
[[Category:OWASP Tool]]
 
[[Category:OWASP Tool]]
 
[[Category:OWASP Project]]   
 
[[Category:OWASP Project]]   

Revision as of 19:26, 4 October 2019

OWASP Project Header.jpg

OWASP Maryam Project

OWASP Maryam framework is an open source software application writted in Python for open-source intelligence(OSINT).


Maryamv1-3-2.png

Description

OWASP Maryam is a full-featured open-source intelligence(OSINT) framework written in Python. Complete with independent modules, built in functions, interactive help, and command completion, provides a command-line environment for used forensic and open-source intelligence(OSINT).

Maryam is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a subclass of the "module" class.The "module" class is a customized "cmd" interpreter equipped with built-in functionality that provides simple interfaces to common tasks such as standardizing output, and making web requests. Therefore, all the hard work has been done. Building modules is simple and takes little more than a few minutes. See the Development Guide for guide information.

Can extract:

  • Comments, Links, CDNs, CSS and JS files and ..
  • Documentations(pdf, doc, ..)
  • Keywords, errors, usernames, ..
  • DNS, TLD, and bruteforce it.
  • SiteMap

Can identify:

  • Interesting and important files
  • Emails from search engines
  • Onion related links
  • Subdomains from different sources
  • Social networks
  • WebApps, WAF, ..
  • and ..

Licensing

GNU GENERAL PUBLIC LICENSE , Version 3

The Maryam is free to use and is licensed under the GPLv3 License. [to see the full license]

Quick Download

Project Leader

Classifications

Project Type Files TOOL.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png
Affero General Public License 3.0