description |
---|
black-widow is one of the most useful, powerful and complete offensive penetration testing tool |
black-widow provides easy ways to execute many kinds of information gatherings and attacks.
- Fully Open Source
- Written in Python
- Continuously updated and extended
- Localhost Web GUI
- Sniffing
- Website crawling
- Web page parsing
- SQL injection
- Injected database management
- Brute force attacks
- Cluster between other black-widows
- Multiple asynchronous requests
- Multiple targets management
- Useful CTF features
sudo add-apt-repository ppa:offensive-hub/black-widow
sudo apt-get update
sudo apt-get install black-widow
- Put the following text on
/etc/apt/sources.list.d/black-widow.list
file:deb http://ppa.launchpad.net/offensive-hub/black-widow/ubuntu focal main deb-src http://ppa.launchpad.net/offensive-hub/black-widow/ubuntu focal main
- Execute the following commands:
sudo sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 5D26C76613E84EA9 sudo apt-get update sudo apt-get install black-widow
sudo pip3 install black-widow
If you haven't Docker, install it
- GUI:
docker run -d -p 8095:80 offensive/black-widow -g
- Than visit: http://localhost:8095
- Command line:
docker run --rm offensive/black-widow <arguments>
sudo apt-get update && sudo apt-get install tidy clang tshark
mkdir black-widow
cd black-widow
touch black-widow.py && chmod +x black-widow.py
- Copy and paste the following code in file
black-widow.py
:#!/usr/bin/env python3 from black_widow.black_widow import main if __name__ == "__main__": main()
git clone [email protected]:offensive-hub/black-widow.git black_widow
sudo pip3 install -U -r black_widow/requirements.txt
./black-widow.py --django migrate black_widow
- Now you can run black-widow with:
./black-widow.py <arguments>
- GUI:
black-widow -g
- Command line:
black-widow <arguments>
- Run django (examples):
black-widow --django runserver
black-widow --django help
black-widow --django "help createsuperuser"
[root]
|
|-- app/ # Main application package
| |
| |-- arguments/ # User input arguments parser (100%)
| |
| |-- attack/ # Attack modality package (0%)
| |-- defense/ # Defense modality package (0%)
| |
| |-- gui/ # Graphical User Interface package (100%)
| |
| |-- helpers/ # Helper methods package (100%)
| |
| |-- managers/ # Managers package
| | |
| | |-- cluster/ # Cluster managers package (0%)
| | |-- crypto/ # Encryption managers package (70%)
| | |-- injection/ # Injection managers package (60%)
| | |-- parser/ # Parser managers package (100%)
| | |-- request/ # Request managers package (70%)
| | |-- sniffer/ # Sniffer managers package (95%)
| |
| |-- services/ # Services package
| | |
| | |-- logger.py # Logger service (100%)
| | |-- multitask.py # MultiTask service (100%)
| | |-- serializer.py # PickleSerializer and JsonSerializer serivces (100%)
| |
| |-- storage/ # Storage directory
| |
| |-- env.py # Environment variables management
|
|-- .env # Environment variables
|
|-- black-widow.py # Main executable
- Homepage: https://black-widow.it
- PyPI: https://pypi.org/project/black-widow
- GitHub: https://github.com/offensive-hub/black-widow
- Docker Registry: https://hub.docker.com/r/offensive/black-widow
- PPA: Launchpad.net
- Free Software Directory: https://directory.fsf.org/wiki/Black-widow