Offensive penetration testing tool
Black Widow is a CTF tool developed by Fabrizio Fubelli during the "CyberChallenge.it 2019" event. It provides many ways and useful methods to exploit many kinds of vulnerabilities. This software will be constantly updated, to keep up to date with the latest existing technologies. Main functionalities: Sniffing; Regex to find and send flag automatically; Multiple requests (sequential and parallel); Multitasking (to solve faster the brute force); Cluster (if two or more computers are running Black Widow inside the same network, they can cluster their problems); Encryption/Decryption by using the popular types of cryptographic algorithms (ex. Base64, MD5, ...).
released on 30 June 2019
Accepts cryptocurrency donations.
23 May 2019
Leaders and contributors
|Fabrizio Fubelli (FabrizioFubelli)||Project Manager, Software Designer, Software Developer|
Resources and communication
|VCS Repository Webview||https://github.com/FabrizioFubelli/black-widow|
|Required to use||Python >= 3.7|
|Required to use||gunicorn|
This entry (in part or in whole) was last reviewed on 30 June 2019.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.