Firstly read this if you want Whitewidow development to continue.
Hello all you whitewidow fans out there (I say that with good intentions I promise!). It's me Ekultek, I'm just here to give you a little inside on what's going on with the whitewidow development team and what's happening with it. Well, to put it bluntly, we will not be continuing the development of whitewidow, the development has been drafted to a different language under a different name. Let me introduce Zeus.
Zeus is whitewidow's big brother, it is capable of all the same things whitewidow is capable of, but with more twists and turns in it. Zeus will bypass the API calling, IP blocking, and captchas that whitewidow cannot get passed. Zeus can run SQLi checks with sqlmap, port scans with NMAP, XSS scans with a built in XSS scanner, admin page finding, along with a couple other cool tricks.
I understand your probably a little dissapointed. This project has been around for over a year now, and you guys have made it possible for me to continue on something better. Of course, you can still use whitewidow! The repository will always be here, I just won't be fixing anything nor pushing new updates to it.
If you want to you can update it, it's up to you guys now! Finally without further ado, here is Zeus enjoy it, and thank you to all of you for giving me the motivation to continue with things. Without you, this wouldn't exist. Hope you enjoy Zeus.
Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google for potential vulnerable websites. It allows automatic file formatting, random user agents, IP addresses, server information, multiple SQL injection syntax, ability to launch sqlmap from the program, and a fun environment. This program was created for learning purposes, and is intended to teach users what vulnerability looks like.
Launching whitewidow displays the custom designed banner and begins searching for possible sites that could be vulnerable
Whitewidow is capable of finding vulnerabilities in websites by scraping Google using over 1,000 different queries that are carefully researched before added. It also uses multiple different SQL injection approaches
Whitewidow is also capable of spidering a single webpage for all available links, it will then search for vulnerabilities in all the links using the programs built in file feature
And when all is said and done, and you're sure that you've found some vulnerable sites, you can launch sqlmap from the program without the need of downloading another clone.
Preferably clone repository, alternatively you can download zip and tarball here
ruby whitewidow.rb -d This will run whitewidow in default mode and scrape Google for possible sites using a random search query.
ruby whitewidow.rb -f path/to/file This will run whitewidow through a given file and add the SQL syntax to the URL.
ruby whitewidow.rb -h Will run the help flag along with show the help menu.
For more information about usage and more flags you can checkout the wiki functionality page here.
To install all gem dependencies, follow the following template:
You may experience a problem installing on Linux systems (Kali, BlackArch, Parrot, etc..) to fix this problem try the following:
sudo apt-get install liblzma-dev
sudo apt-get install zlib1g-dev
This should install all gems needed, and will allow you to run the program without trouble.
Being an open source project, feel free to contribute your ideas and open pull request. You can fork it clone it do pretty much whatever you want to do with it. For more information including copyright info please see the docs.
If you decide to contribute to this project, your name will go in the docs under the author and credits file. It will remain there to show that you have successfully contributed to Whitewidow. Thank you ahead of time for all contributions, this project wouldn't exist without your help!
If for any reason you need to contact me, please create an issue and check the email request box. I will typically reply to your request within 48 hours of receiving the request.