ruby whitewidow.rb -h Will print the help page
ruby whitewidow.rb -e Will print the examples page
ruby whitewidow.rb -f <path/to/file> Will run Whitewidow through a file, you will not need to provide whitewidow the full path to the file, just provide it the paths within the whitewidow directory itself. Also you will not need a beginning slash, example:
- whitewidow.rb -f tmp/sites.txt #<= CORRECT - whitewidow.rb -f /home/users/me/whitewidow-1.0.6/tmp/sites.txt #<= INCORRECT
ruby whitewidow.rb -d Will run whitewidow in default mode and scrape Google using the search queries in the lib directory
gem 'nokogiri', '~> 184.108.40.206'
To install all gem dependencies, follow the following template:
This should install all gems needed, and will allow you to run the program without trouble.
Current Version 220.127.116.11
- Custom user agent
- Webcrawler to search specified site for vulnerabilities
- Will be moving all .rb extension files into lib/core directory
- Advanced searching, meaning multiple pages of Google, along with multiple parameter checking.
- Ability to detect database type.
- Using multiple search engines, such as DuckDuckGo, Google, Bing, Yahoo. This will prevent one search engine from taking the multiple searches as a threat and will give further anomity to the program. I will also be adding IP anomity with a built in proxy feature. This feature will ALWAYS be on, and will have a flag (–no-proxy) so That you can decide to not use a proxy.