Skip to content
A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
Branch: master
Clone or download
Latest commit a3c6f83 Nov 8, 2018
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
Dockerfile
LICENSE.md
README.md
blackwidow
blackwidow-report1.png BlackWidow by 1N3@CrowdShield Jan 6, 2018
blackwidowlogo.png BlackWidow by 1N3@CrowdShield Jan 6, 2018
injectx.py BlackWidow by 1N3@CrowdShield Aug 26, 2018
requirements.txt BlackWidow by 1N3@CrowdShield Aug 26, 2018

README.md

alt tag

ABOUT:

BlackWidow is a python based web application spider to gather subdomains, URL's, dynamic parameters, email addresses and phone numbers from a target website. This project also includes Inject-X fuzzer to scan dynamic URL's for common OWASP vulnerabilities.

DEMO VIDEO:

BlackWidow Demo

FEATURES:

  • Automatically collect all URL's from a target website
  • Automatically collect all dynamic URL's and parameters from a target website
  • Automatically collect all subdomains from a target website
  • Automatically collect all phone numbers from a target website
  • Automatically collect all email addresses from a target website
  • Automatically collect all form URL's from a target website
  • Automatically scan/fuzz for common OWASP TOP vulnerabilities
  • Automatically saves all data into sorted text files

LINUX INSTALL:

cp blackwidow /usr/bin/blackwidow 
cp injectx.py /usr/bin/injectx.py
pip install -r requirements.txt

USAGE:

blackwidow -u https://target.com - crawl target.com with 3 levels of depth.
blackwidow -d target.com -l 5 -v y - crawl the domain: target.com with 5 levels of depth with verbose logging enabled.
blackwidow -d target.com -l 5 -c 'test=test' - crawl the domain: target.com with 5 levels of depth using the cookie 'test=test'
blackwidow -d target.com -l 5 -s y -v y - crawl the domain: target.com with 5 levels of depth and fuzz all unique parameters for OWASP vulnerabilities with verbose logging on.
injectx.py -u https://test.com/uers.php?user=1&admin=true -v y - Fuzz all GET parameters for common OWASP vulnerabilities with verbose logging enabled.

SAMPLE REPORT:

alt tag

DOCKER:

git clone https://github.com/1N3/BlackWidow.git
cd BlackWidow
docker build -t blackwidow .
docker run -it blackwidow # Defaults to --help

LICENSE:

This software is released under the GNU General Public License v3.0. See LICENSE.md for details.

DONATIONS:

Donations are welcome. This will help facilitate improved features, frequent updates and better overall support.

  • [+] BTC 1Fav36btfmdrYpCAR65XjKHhxuJJwFyKum
  • [+] ETH 0x20bB09273702eaBDFbEE9809473Fd04b969a794d
  • [+] LTC LQ6mPewec3xeLBYMdRP4yzeta6b9urqs2f
  • [+] XMR 4JUdGzvrMFDWrUUwY3toJATSeNwjn54LkCnKBPRzDuhzi5vSepHfUckJNxRL2gjkNrSqtCoRUrEDAgRwsQvVCjZbS3EN24xprAQ1Z5Sy5s
  • [+] ZCASH t1fsizsk2cqqJAjRoUmXJSyoVa9utYucXt7

SOCIAL MEDIA:

You can’t perform that action at this time.