# Preamble
~Firstly read [this](https://github.com/WhitewidowScanner/whitewidow/issues/82) if you want Whitewidow development to continue.~
Hello all you whitewidow fans out there (I say that with good intentions I promise!). It's me Ekultek, I'm just here to give you a little inside on what's going on with the whitewidow development team and what's happening with it. Well, to put it bluntly, we will not be continuing the development of whitewidow, the development has been drafted to a different language under a different name. Let me introduce [Zeus](https://github.com/ekultek/zeus-scanner).
Zeus is whitewidow's big brother, it is capable of all the same things whitewidow is capable of, but with more twists and turns in it. Zeus will bypass the API calling, IP blocking, and captchas that whitewidow cannot get passed. Zeus can run SQLi checks with sqlmap, port scans with NMAP, XSS scans with a built in XSS scanner, admin page finding, along with a couple other cool tricks.
I understand your probably a little dissapointed. This project has been around for over a year now, and you guys have made it possible for me to continue on something better. Of course, you can still use whitewidow! The repository will always be here, I just won't be fixing anything nor pushing new updates to it.
If you want to you can update it, it's up to you guys now! Finally without further ado, here is [Zeus](https://github.com/ekultek/zeus-scanner) enjoy it, and thank you to all of you for giving me the motivation to continue with things. Without you, this wouldn't exist. Hope you enjoy Zeus.
# Whitewidow
Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can
scrape Google for potential vulnerable websites. It allows automatic file formatting, random user agents, IP addresses, server information, multiple SQL injection syntax, ability to launch sqlmap from the program, and a fun environment. This program was created for learning purposes, and is intended to teach users what vulnerability looks like.
# Screenshots
Launching whitewidow displays the custom designed banner and begins searching for possible sites that could be vulnerable
![banner credits legal new.png](https://s24.postimg.org/3njorm3ut/whitewidow_banner.png)
Whitewidow is capable of finding vulnerabilities in websites by scraping Google using over 1,000 different queries that are carefully researched before added. It also uses multiple different SQL injection approaches
![error](https://s24.postimg.org/yryg8oo3p/sql_test_error_injection.png)
![blind](https://s24.postimg.org/97w6292px/sql_test_blind_injection.png)
![union](https://s24.postimg.org/lp2tpexvp/sql_test_union_injection.png)
Whitewidow is also capable of spidering a single webpage for all available links, it will then search for vulnerabilities in all the links using the programs built in file feature
![spider.jpg](https://s24.postimg.org/s5bsfi6f9/whitewidow_spider.png)
And when all is said and done, and you're sure that you've found some vulnerable sites, you can launch sqlmap from the program without the need of downloading another clone.
![sqlmap](https://s17.postimg.org/is53u576n/11_20_sqlmap.png)
# Download
Preferably clone repository, alternatively you can download zip and tarball [here](https://github.com/Ekultek/whitewidow/releases/tag/2.0)
# Basic Usage
`ruby whitewidow.rb -d` This will run whitewidow in default mode and scrape Google for possible sites using a random search query.
`ruby whitewidow.rb -f path/to/file` This will run whitewidow through a given file and add the SQL syntax to the URL.
`ruby whitewidow.rb -h` Will run the help flag along with show the help menu.
For more information about usage and more flags you can checkout the wiki functionality page [here](https://github.com/Ekultek/whitewidow/wiki/Functionality).
# Dependencies
- `gem 'mechanize'`
- `gem 'nokogiri'`
- `gem 'rest-client'`
- `gem 'webmock'`
- `gem 'rspec'`
- `gem 'vcr'`
To install all gem dependencies, follow the following template:
`cd whitewidow`
`bundle install`
You may experience a problem installing on Linux systems (Kali, BlackArch, Parrot, etc..) to fix this problem try the following:
`sudo apt-get install liblzma-dev`
`sudo apt-get install zlib1g-dev`
`cd whitewidow`
`bundle install`
This should install all gems needed, and will allow you to run the program without trouble.
# Contribute
Being an open source project, feel free to contribute your ideas and open pull request. You can fork it clone it do pretty
much whatever you want to do with it. For more information including copyright info please see the docs.
If you decide
to contribute to this project, your name will go in the docs under the author and credits file. It will remain there to
show that you have successfully contributed to Whitewidow. Thank you ahead of time for all contributions, this project
wouldn't exist without your help!
# Contact the developer
If for any reason you need to contact me, please create an issue and check the email request box. I will typically reply to your request within 48 hours of receiving the request.
<a href="https://zenhub.com"><img src="https://raw.githubusercontent.com/ZenHubIO/support/master/zenhub-badge.png"></a>
没有合适的资源?快使用搜索试试~ 我知道了~
Web 程序 SQL 漏洞检测工具.zip
共575个文件
py:405个
txt:23个
md:22个
需积分: 9 2 下载量 8 浏览量
2019-09-25
02:15:58
上传
评论
收藏 9.56MB ZIP 举报
温馨提示
Web 程序 SQL 漏洞检测工具.zip,SQL漏洞扫描程序
资源推荐
资源详情
资源评论
收起资源包目录
Web 程序 SQL 漏洞检测工具.zip (575个子文件)
stager.asp_ 1KB
backdoor.asp_ 240B
stager.aspx_ 527B
backdoor.aspx_ 417B
AUTHOR_AND_CREDITS 351B
AUTHORS 190B
icmpsh-s.c 9KB
icmpsh-m.c 4KB
sqlmap.conf 20KB
COPYING 20KB
runcmd.cpp 1KB
stdafx.cpp 293B
GeoIPCountry.csv 10.34MB
lib_mysqludf_sys.dll_ 5KB
lib_postgresqludf_sys.dll_ 5KB
lib_postgresqludf_sys.dll_ 5KB
lib_postgresqludf_sys.dll_ 5KB
lib_mysqludf_sys.dll_ 4KB
lib_postgresqludf_sys.dll_ 4KB
runcmd.exe_ 36KB
icmpsh.exe_ 7KB
shellcodeexec.x32.exe_ 3KB
Gemfile 143B
.gitattributes 232B
.gitignore 1KB
.gitignore 55B
stdafx.h 516B
stager.jsp_ 1KB
backdoor.jsp_ 360B
LICENSE 1KB
COPYRIGHT.md 32KB
CHANGELOG.md 32KB
THANKS.md 24KB
CHANGELOG.md 21KB
THIRD-PARTY.md 14KB
README.md 5KB
README-gr-GR.md 4KB
README.md 4KB
README-bg-BG.md 4KB
CONTRIBUTING.md 3KB
README-ja-JP.md 3KB
README-es-MX.md 3KB
README-fr-FR.md 3KB
README-it-IT.md 3KB
README-pt-BR.md 3KB
README-hr-HR.md 3KB
README-id-ID.md 3KB
README-tr-TR.md 3KB
README-zh-CN.md 3KB
ISSUE_TEMPLATE.md 1KB
LICENSE.md 1KB
ISSUE_TEMPLATE.md 979B
checksum.md5 28KB
README.pdf 483KB
FAQ.pdf 305KB
backdoor.php_ 485B
stager.php_ 377B
icmpsh-m.pl 2KB
bottle.py 149KB
common.py 145KB
clientform.py 123KB
xdot.py 94KB
option.py 91KB
gprof2dot.py 82KB
big5freq.py 81KB
beautifulsoup.py 78KB
checks.py 67KB
connect.py 58KB
agent.py 50KB
jisfreq.py 46KB
odict.py 45KB
euckrfreq.py 45KB
cmdline.py 44KB
databases.py 41KB
hash.py 35KB
gb2312freq.py 35KB
settings.py 34KB
euctwfreq.py 34KB
target.py 31KB
inference.py 31KB
controller.py 30KB
metasploit.py 30KB
socks.py 29KB
api.py 29KB
dump.py 27KB
pyDes.py 27KB
entries.py 27KB
fcrypt.py 26KB
users.py 26KB
search.py 26KB
keepalive.py 22KB
inject.py 21KB
use.py 20KB
use.py 19KB
mbcssm.py 19KB
jpcntx.py 19KB
langcyrillicmodel.py 17KB
takeover.py 17KB
web.py 17KB
enumeration.py 17KB
共 575 条
- 1
- 2
- 3
- 4
- 5
- 6
资源评论
weixin_38743602
- 粉丝: 394
- 资源: 2万+
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功