Skip to content

HoogDooo/whitewidow

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Build status license

#Whitewidow Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potential vulnerable websites. It allows automatic file formatting, random user agents, IP addresses, server information, multiple SQL injection syntax, ability to launch sqlmap from the program, and a fun environment. This program was created for learning purposes, and is intended to teach users what vulnerability looks like.

#Screenshots Launching whitewidow displays the custom designed banner and begins searching for possible sites that could be vulnerable

banner credits legal new.png

Whitewidow is capable of finding vulnerabilities in websites by scraping Google using over 1,000 different queries that are carefully researched before added

11-20 vulns.png

Whitewidow is also capable of spidering a single webpage for all available links, it will then search for vulnerabilities in all the links using the programs built in file feature

spider.jpg

And when all is said and done, and you're sure that you've found some vulnerable sites, you can launch sqlmap from the program without the need of downloading another clone.

sqlmap

#Download Preferably clone repository, alternatively you can download zip and tarball here

#Usage ruby whitewidow.rb -h Will print the help page

ruby whitewidow.rb -l Will display the legal info, can also be run in conjunction with -f or -d

ruby whitewidow.rb -d Will run whitewidow in default mode and scrape Google using the search queries in the lib directory

ruby whitewidow.rb -d --banner Will scrape Google and hide the banner

ruby whitewidow.rb -d --random-agent Will grab a random user agent from the YAML file. If not used will use default agent

ruby whitewidow.rb -d --proxy 127.0.0.1:80 Proxy configuration, must use the ":"

ruby whitewidow.rb -d --dry-run Will do a dry run of the program, meaning it won't scan for vulnerabilities, will prompt if you want to run a scan or not

ruby whitewidow.rb -d --dry-run --batch Will do a dry run and not prompt you for anything, won't run a scan

ruby whitewidow.rb -f <path/to/file> Will run Whitewidow through a file, you will not need to provide whitewidow the full path to the file, just provide it the paths within the whitewidow directory itself. Also you will not need a beginning slash, example:

- whitewidow.rb -f tmp/sites.txt #<= CORRECT
- whitewidow.rb -f /home/users/me/whitewidow-1.0.6/tmp/sites.txt #<= INCORRECT

ruby whitewidow.rb --run-x 10 Will run 10 dry runs in batch mode and display no other information (legal, banner, etc..)

ruby whitewidow.rb -s URL Will spider the URL and extract all the links from there, saving them to a file. Will then run the file through whitewidows file flag

ruby whitewidow.rb --sqlmap Will launch sqlmap and run it through the SQL_VULN.LOG file.

#Dependencies gem 'mechanize'

gem 'nokogiri'

gem 'rest-client'

To install all gem dependencies, follow the following template:

cd whitewidow

bundle install

This should install all gems needed, and will allow you to run the program without trouble.

#Contribute Being an open source project, feel free to contribute your ideas and open pull request. You can fork it clone it do pretty much whatever you want to do with it. For more information including copyright info please see the docs.

If you decide to contribute to this project, your name will go in the docs under the author and credits file. It will remain there to show that you have successfully contributed to Whitewidow. Thank you ahead of time for all contributions, this project wouldn't exist without your help!

#Contact the developer If for any reason you need to contact me, please create an issue and check the email request box. I will typically reply to your request within 48 hours of receiving the request.

About

SQL Vulnerability Scanner

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 96.6%
  • Ruby 1.8%
  • C 0.8%
  • Shell 0.6%
  • Perl 0.1%
  • C++ 0.1%