Difference between revisions of "Black-widow"

From Free Software Directory
Jump to: navigation, search
(The GitHub repositoryo is currently private. I'm waiting the end of CyberChallenge.it 2019 to make it public.)
 
(Updated URL website)
 
(6 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{{Entry
 
{{Entry
 
|Name=Black Widow
 
|Name=Black Widow
|Short description=CTF Tool
+
|Short description=Offensive penetration testing tool
 
|Full description=Black Widow is a CTF tool developed by Fabrizio Fubelli during the "CyberChallenge.it 2019" event.
 
|Full description=Black Widow is a CTF tool developed by Fabrizio Fubelli during the "CyberChallenge.it 2019" event.
 
It provides many ways and useful methods to exploit many kinds of vulnerabilities.
 
It provides many ways and useful methods to exploit many kinds of vulnerabilities.
 
This software will be constantly updated, to keep up to date with the latest existing technologies.
 
This software will be constantly updated, to keep up to date with the latest existing technologies.
 
Main functionalities:
 
Main functionalities:
Funzionalità:
 
 
Sniffing;
 
Sniffing;
 
Regex to find and send flag automatically;
 
Regex to find and send flag automatically;
Line 13: Line 12:
 
Cluster (if two or more computers are running Black Widow inside the same network, they can cluster their problems);
 
Cluster (if two or more computers are running Black Widow inside the same network, they can cluster their problems);
 
Encryption/Decryption by using the popular types of cryptographic algorithms (ex. Base64, MD5, ...).
 
Encryption/Decryption by using the popular types of cryptographic algorithms (ex. Base64, MD5, ...).
|Homepage URL=https://www.black-widow.eu
+
|Homepage URL=https://black-widow.eu
 
|Is High Priority Project=No
 
|Is High Priority Project=No
|Computer languages=Python
+
|VCS checkout command=git clone https://github.com/FabrizioFubelli/black-widow.git
 +
|Computer languages=Python, Bash, HTML, JavaScript, CSS
 
|Decommissioned or Obsolete=No
 
|Decommissioned or Obsolete=No
 +
|Donate=https://www.blockchain.com/btc/payment_request?address=1MvJWayqFwGxkPDoH5v6tDToK8KnKC9kgt
 +
|Keywords=blaack-widow, ctf tool, penetration testing, cyber security, pentest, kali, linux
 +
|Version date=2019/06/30
 
|Version status=alpha
 
|Version status=alpha
 +
|Version download=https://github.com/FabrizioFubelli/black-widow/archive/master.zip
 +
|Last review by=FabrizioFubelli
 +
|Last review date=2020/09/20
 +
|Submitted by=Fabrizio Fubelli
 +
|Submitted date=2019/06/30
 
|User level=advanced
 
|User level=advanced
|Accepts cryptocurrency donations=No
+
|Accepts cryptocurrency donations=Yes
 
|Test entry=No
 
|Test entry=No
 
|Is GNU=No
 
|Is GNU=No
Line 28: Line 36:
 
|License verified by=Fabrizio Fubelli
 
|License verified by=Fabrizio Fubelli
 
|License verified date=2019-05-23
 
|License verified date=2019-05-23
 +
|License note=https://raw.githubusercontent.com/FabrizioFubelli/black-widow/master/LICENSE
 
}}
 
}}
 
{{Person
 
{{Person
 
|Real name=Fabrizio Fubelli
 
|Real name=Fabrizio Fubelli
|Role=Project Manager, Developer
+
|Role=Project Manager, Software Designer, Software Developer
 
|Email=fabrizio.fubelli@outlook.it
 
|Email=fabrizio.fubelli@outlook.it
 
|Username=FabrizioFubelli
 
|Username=FabrizioFubelli
 +
}}
 +
{{Resource
 +
|Resource kind=VCS Repository Webview
 +
|Resource URL=https://github.com/FabrizioFubelli/black-widow
 +
}}
 +
{{Resource
 +
|Resource kind=Developer
 +
|Resource URL=https://fabrizio.fubelli.org/
 +
}}
 +
{{Resource
 +
|Resource kind=Bug Tracking
 +
|Resource URL=https://github.com/FabrizioFubelli/black-widow/issues
 
}}
 
}}
 
{{Software category
 
{{Software category
|Programming-language=python
+
|Interface=command-line, web
 +
|Programming-language=python, shell
 
|Runs-on=GNU/Linux
 
|Runs-on=GNU/Linux
|Use=copying, editing, education, security
+
|Security=encryption, internet
 +
|Use=education, security
 
|Version-control=git
 
|Version-control=git
 +
|Works-with=database, html, sql
 
}}
 
}}
 
{{Software prerequisite
 
{{Software prerequisite
 
|Prerequisite kind=Required to use
 
|Prerequisite kind=Required to use
|Prerequisite description=Needs Python 3.7 or later. Other dependencies are written in the README.md
+
|Prerequisite description=Python >= 3.7
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Required to use
 +
|Prerequisite description=gunicorn
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=numpy
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=pyshark
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=pytidylib
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=requests
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=simplejson
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=sqlmap
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=termcolor
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=tinytag
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=urllib3
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Weak prerequisite
 +
|Prerequisite description=django
 +
}}
 +
{{Software prerequisite
 +
|Prerequisite kind=Source requirement
 +
|Prerequisite description=netifaces
 
}}
 
}}
 
{{Featured}}
 
{{Featured}}

Latest revision as of 08:02, 20 September 2020


[edit]

Black Widow

https://black-widow.eu
Offensive penetration testing tool

Black Widow is a CTF tool developed by Fabrizio Fubelli during the "CyberChallenge.it 2019" event. It provides many ways and useful methods to exploit many kinds of vulnerabilities. This software will be constantly updated, to keep up to date with the latest existing technologies. Main functionalities: Sniffing; Regex to find and send flag automatically; Multiple requests (sequential and parallel); Multitasking (to solve faster the brute force); Cluster (if two or more computers are running Black Widow inside the same network, they can cluster their problems); Encryption/Decryption by using the popular types of cryptographic algorithms (ex. Base64, MD5, ...).





Licensing

License

Verified by

Verified on

Notes

Verified by

Fabrizio Fubelli

Verified on

23 May 2019




Leaders and contributors

Contact(s)Role
Fabrizio Fubelli (FabrizioFubelli)Project Manager, Software Designer, Software Developer


Resources and communication

AudienceResource typeURI
VCS Repository Webviewhttps://github.com/FabrizioFubelli/black-widow
Developerhttps://fabrizio.fubelli.org/
Bug Trackinghttps://github.com/FabrizioFubelli/black-widow/issues


Software prerequisites

KindDescription
Source requirementpytidylib
Source requirementtermcolor
Source requirementnumpy
Source requirementurllib3
Required to usePython >= 3.7
Source requirementtinytag
Weak prerequisitedjango
Source requirementsqlmap
Source requirementrequests
Source requirementnetifaces
Required to usegunicorn
Source requirementsimplejson
Source requirementpyshark




Entry








"Project Manager, Software Designer, Software Developer" is not in the list (Maintainer, Contributor, Developer, Sponsor, Unknown) of allowed values for the "Role" property.







































Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.