Skip to content

offensive-hub/black-widow

Repository files navigation

description
black-widow is one of the most useful, powerful and complete offensive penetration testing tool

black-widow

Python 3.x License Docker Pulls

Offensive penetration testing tool (Open Source)

black-widow provides easy ways to execute many kinds of information gatherings and attacks.

  • Fully Open Source
  • Written in Python
  • Continuously updated and extended

Features

  • Localhost Web GUI
  • Sniffing
  • Website crawling
  • Web page parsing
  • SQL injection
  • Injected database management
  • Brute force attacks
  • Cluster between other black-widows
  • Multiple asynchronous requests
  • Multiple targets management
  • Useful CTF features

  APT installation (ubutu/debian)

sudo add-apt-repository ppa:offensive-hub/black-widow sudo apt-get update sudo apt-get install black-widow 

  APT installation (other distro)

  1. Put the following text on /etc/apt/sources.list.d/black-widow.list file:
    deb http://ppa.launchpad.net/offensive-hub/black-widow/ubuntu focal main deb-src http://ppa.launchpad.net/offensive-hub/black-widow/ubuntu focal main 
  2. Execute the following commands:
    sudo sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 5D26C76613E84EA9 sudo apt-get update sudo apt-get install black-widow 

  PyPI installation

sudo pip3 install black-widow

  Docker installation

If you haven't Docker, install it

  • GUI: docker run -d -p 8095:80 offensive/black-widow -g
  • Command line: docker run --rm offensive/black-widow <arguments>

Manual installation

  1. sudo apt-get update && sudo apt-get install tidy clang tshark
  2. mkdir black-widow
  3. cd black-widow
  4. touch black-widow.py && chmod +x black-widow.py
  5. Copy and paste the following code in file black-widow.py:
    #!/usr/bin/env python3 from black_widow.black_widow import main if __name__ == "__main__": main()
  6. git clone git@github.com:offensive-hub/black-widow.git black_widow
  7. sudo pip3 install -U -r black_widow/requirements.txt
  8. ./black-widow.py --django migrate black_widow
  9. Now you can run black-widow with: ./black-widow.py <arguments>

Run

  • GUI: black-widow -g
  • Command line: black-widow <arguments>

Debug

  • Run django (examples):
    • black-widow --django runserver
    • black-widow --django help
    • black-widow --django "help createsuperuser"

Project layout

[root] | |-- app/ # Main application package | | | |-- arguments/ # User input arguments parser (100%) | | | |-- attack/ # Attack modality package (0%) | |-- defense/ # Defense modality package (0%) | | | |-- gui/ # Graphical User Interface package (100%) | | | |-- helpers/ # Helper methods package (100%) | | | |-- managers/ # Managers package | | | | | |-- cluster/ # Cluster managers package (0%) | | |-- crypto/ # Encryption managers package (70%) | | |-- injection/ # Injection managers package (60%) | | |-- parser/ # Parser managers package (100%) | | |-- request/ # Request managers package (70%) | | |-- sniffer/ # Sniffer managers package (95%) | | | |-- services/ # Services package | | | | | |-- logger.py # Logger service (100%) | | |-- multitask.py # MultiTask service (100%) | | |-- serializer.py # PickleSerializer and JsonSerializer serivces (100%) | | | |-- storage/ # Storage directory | | | |-- env.py # Environment variables management | |-- .env # Environment variables | |-- black-widow.py # Main executable 

Links

Contacts

Authors

Thanks to

Follow Us

FacebookInstagramTwitter

SPONSORS

1st level Sponsors

Offensive Hub

2nd level Sponsors

Offensive Hub

3th level Sponsors

Offensive Hub