black-widow provides easy ways to execute many kinds of information gatherings and attacks.
Fully Open Source
Written in Python
Continuously updated and extended
Localhost Web GUI
Sniffing
Website crawling
Web page parsing
SQL injection
Injected database management
Brute force attacks
Cluster between other black-widows
Multiple asynchronous requests
Multiple targets management
Useful CTF features
sudo add-apt-repository ppa:offensive-hub/black-widowsudo apt-get updatesudo apt-get install black-widow
1) Put the following text on /etc/apt/sources.list.d/black-widow.list
file:
deb http://ppa.launchpad.net/offensive-hub/black-widow/ubuntu focal maindeb-src http://ppa.launchpad.net/offensive-hub/black-widow/ubuntu focal main
2) Execute the following commands:
sudo sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 5D26C76613E84EA9sudo apt-get updatesudo apt-get install black-widow
sudo pip3 install black-widow
If you haven't Docker, install it
GUI: docker run -d -p 8095:80 offensive/black-widow -g
Than visit: http://localhost:8095
Command line: docker run --rm offensive/black-widow <arguments>
1) sudo apt-get update && sudo apt-get install tidy clang tshark
2) mkdir black-widow
3) cd black-widow
4) touch black-widow.py && chmod +x black-widow.py
5) Copy and paste the following code in file black-widow.py
:
#!/usr/bin/env python3from black_widow.black_widow import mainif __name__ == "__main__":main()
6) git clone git@github.com:offensive-hub/black-widow.git black_widow
7) sudo pip3 install -U -r black_widow/requirements.txt
8) ./black-widow.py --django migrate
9) Now you can run black-widow with: ./black-widow.py <arguments>
GUI: black-widow -g
Command line: black-widow <arguments>
Run django (examples):
black-widow --django runserver
black-widow --django help
black-widow --django "help createsuperuser"
[root]||-- app/ # Main application package| || |-- arguments/ # User input arguments parser (100%)| || |-- attack/ # Attack modality package (0%)| |-- defense/ # Defense modality package (0%)| || |-- gui/ # Graphical User Interface package (100%)| || |-- helpers/ # Helper methods package (100%)| || |-- managers/ # Managers package| | || | |-- cluster/ # Cluster managers package (0%)| | |-- crypto/ # Encryption managers package (70%)| | |-- injection/ # Injection managers package (60%)| | |-- parser/ # Parser managers package (100%)| | |-- request/ # Request managers package (70%)| | |-- sniffer/ # Sniffer managers package (95%)| || |-- services/ # Services package| | || | |-- logger.py # Logger service (100%)| | |-- multitask.py # MultiTask service (100%)| | |-- serializer.py # PickleSerializer and JsonSerializer serivces (100%)| || |-- storage/ # Storage directory| || |-- env.py # Environment variables management||-- .env # Environment variables||-- black-widow.py # Main executable
Homepage: https://black-widow.eu
Docker Registry: https://hub.docker.com/r/offensive/black-widow
PPA: Launchpad.net
Free Software Directory: https://directory.fsf.org/wiki/Black-widow
2nd level Sponsors
3th level Sponsors