| description |
|---|
black-widow is one of the most useful, powerful and complete offensive penetration testing tool |
black-widow provides easy ways to execute many kinds of information gatherings and attacks.
- Fully Open Source
- Written in Python
- Continuously updated and extended
- Localhost Web GUI
- Sniffing
- Website crawling
- Web page parsing
- SQL injection
- Injected database management
- Brute force attacks
- Cluster between other black-widows
- Multiple asynchronous requests
- Multiple targets management
- Useful CTF features
sudo add-apt-repository ppa:offensive-hub/black-widow sudo apt-get update sudo apt-get install black-widow - Put the following text on
/etc/apt/sources.list.d/black-widow.listfile:deb http://ppa.launchpad.net/offensive-hub/black-widow/ubuntu focal main deb-src http://ppa.launchpad.net/offensive-hub/black-widow/ubuntu focal main - Execute the following commands:
sudo sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 5D26C76613E84EA9 sudo apt-get update sudo apt-get install black-widow
sudo pip3 install black-widowIf you haven't Docker, install it
- GUI:
docker run -d -p 8095:80 offensive/black-widow -g- Than visit: http://localhost:8095
- Command line:
docker run --rm offensive/black-widow <arguments>
sudo apt-get update && sudo apt-get install tidy clang tsharkmkdir black-widowcd black-widowtouch black-widow.py && chmod +x black-widow.py- Copy and paste the following code in file
black-widow.py:#!/usr/bin/env python3 from black_widow.black_widow import main if __name__ == "__main__": main()
git clone git@github.com:offensive-hub/black-widow.git black_widowsudo pip3 install -U -r black_widow/requirements.txt./black-widow.py --django migrate black_widow- Now you can run black-widow with:
./black-widow.py <arguments>
- GUI:
black-widow -g - Command line:
black-widow <arguments>
- Run django (examples):
black-widow --django runserverblack-widow --django helpblack-widow --django "help createsuperuser"
[root] | |-- app/ # Main application package | | | |-- arguments/ # User input arguments parser (100%) | | | |-- attack/ # Attack modality package (0%) | |-- defense/ # Defense modality package (0%) | | | |-- gui/ # Graphical User Interface package (100%) | | | |-- helpers/ # Helper methods package (100%) | | | |-- managers/ # Managers package | | | | | |-- cluster/ # Cluster managers package (0%) | | |-- crypto/ # Encryption managers package (70%) | | |-- injection/ # Injection managers package (60%) | | |-- parser/ # Parser managers package (100%) | | |-- request/ # Request managers package (70%) | | |-- sniffer/ # Sniffer managers package (95%) | | | |-- services/ # Services package | | | | | |-- logger.py # Logger service (100%) | | |-- multitask.py # MultiTask service (100%) | | |-- serializer.py # PickleSerializer and JsonSerializer serivces (100%) | | | |-- storage/ # Storage directory | | | |-- env.py # Environment variables management | |-- .env # Environment variables | |-- black-widow.py # Main executable - Homepage: https://black-widow.it
- PyPI: https://pypi.org/project/black-widow
- GitHub: https://github.com/offensive-hub/black-widow
- Docker Registry: https://hub.docker.com/r/offensive/black-widow
- PPA: Launchpad.net
- Free Software Directory: https://directory.fsf.org/wiki/Black-widow



