Investigator Use
Maryam (OSINT Framework) is an open-source intelligence framework available on GitHub that provides a modular, extensible platform for automated OSINT data collection across multiple sources. It supports modules for searching social media, web content, DNS records, email intelligence, and other data sources through a unified command-line interface.
For OSINT investigators with programming capability, Maryam provides a scriptable investigation automation platform that eliminates the manual overhead of running the same queries across multiple sources. A single Maryam command can query multiple data sources, aggregate results, and output structured data for further analysis.
The framework's modular architecture allows investigators to develop custom modules for specific data sources, investigation types, or reporting formats — making it adaptable to specialized investigative needs beyond the default module collection.
Automated multi-source querying is Maryam's primary operational value. For systematic investigation of specific subjects or domains, running a complete Maryam workflow covers all configured sources simultaneously, ensuring comprehensive coverage without the manual effort of individual source queries.
The output formatting capabilities allow Maryam to produce structured reports in JSON, CSV, or custom formats — directly usable for further programmatic analysis, database import, or reporting.
For organizations conducting high-volume OSINT research (threat intelligence teams, large-scale investigations, competitive intelligence programs), frameworks like Maryam provide the automation foundation for scalable investigation workflows that manual research cannot match.
Maryam complements visual OSINT platforms like Maltego by providing a command-line automation approach suitable for programmatic investigation workflows.
Installation requires Python 3. Configuration of API keys for specific data source integrations enables access to sources that require authentication. The framework is actively maintained with new modules added by the community.
Document the Maryam version used, modules executed, target identifiers, and all output produced for investigation records.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.