Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/owtf/owtf
Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
https://github.com/owtf/owtf
framework kali-linux owasp owtf pentest python security web-application-security
Last synced: 6 days ago
JSON representation
Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
- Host: GitHub
- URL: https://github.com/owtf/owtf
- Owner: owtf
- License: bsd-3-clause
- Created: 2012-01-19T06:42:44.000Z (almost 13 years ago)
- Default Branch: develop
- Last Pushed: 2024-08-26T22:39:25.000Z (2 months ago)
- Last Synced: 2024-08-27T02:33:33.815Z (2 months ago)
- Topics: framework, kali-linux, owasp, owtf, pentest, python, security, web-application-security
- Language: Python
- Homepage: https://medium.com/@owtf
- Size: 25.8 MB
- Stars: 1,801
- Watchers: 128
- Forks: 470
- Open Issues: 81
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: .github/CONTRIBUTING.md
- License: LICENSE.md
- Code of conduct: CODE_OF_CONDUCT.md
- Security: SECURITY.md
- Authors: AUTHORS.md
Awesome Lists containing this project
- awesome-rainmana - owtf/owtf - Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp (Python)
- awesome-repositories - owtf/owtf - Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp (Python)
- awesome-hacking-lists - owtf/owtf - Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp (Python)
README
# Offensive Web Testing Framework
![Build staus](https://github.com/owtf/owtf/actions/workflows/main.yml/badge.svg)
[![License (3-Clause
BSD)](https://img.shields.io/badge/license-BSD%203--Clause-blue.svg?style=flat-square)](http://opensource.org/licenses/BSD-3-Clause)
[![python_3.6](https://img.shields.io/badge/python-3.6-blue.svg)](https://www.python.org/downloads/)
[![python_3.7](https://img.shields.io/badge/python-3.7-blue.svg)](https://www.python.org/downloads/)
[![python_3.8](https://img.shields.io/badge/python-3.8-blue.svg)](https://www.python.org/downloads/)**OWASP OWTF** is a project focused on penetration testing efficiency
and alignment of security tests to security standards like the OWASP
Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST so that
pentesters will have more time to- See the big picture and think out of the box
- More efficiently find, verify and combine vulnerabilities
- Have time to investigate complex vulnerabilities like business
logic/architectural flaws or virtual hosting sessions
- Perform more tactical/targeted fuzzing on seemingly risky areas
- Demonstrate true impact despite the short timeframes we are
typically given to test.The tool is highly configurable and anybody can trivially create simple
plugins or add new tests in the configuration files without having any
development experience.> **Note**: This tool is however not a **silverbullet** and will only be
> as good as the person using it: Understanding and experience will be
> required to correctly interpret tool output and decide what to
> investigate further in order to demonstrate impact.# Requirements
OWTF is developed on KaliLinux and macOS but it is made for Kali Linux
(or other Debian derivatives)OWTF supports Python3.
## OSX pre-requisites
Dependencies: Install Homebrew () and follow the steps
given below:```{.sourceCode .bash}
python3 -m venv ~/.virtualenvs/owtf
source ~/.virtualenvs/owtf/bin/activate
brew install coreutils gnu-sed openssl
# We need to install 'cryptography' first to avoid issues
pip install cryptography --global-option=build_ext --global-option="-L/usr/local/opt/openssl/lib" --global-option="-I/usr/local/opt/openssl/include"
```# Installation
## Running as a Docker container:
The recommended way to use OWTF is by building the Docker Image so you will not have to worry about dependencies issues and installing the various pentesting tools.* `docker` and `docker-compose` is required. (https://docs.docker.com/compose/install/)
```
git clone https://github.com/owtf/owtf
cd owtf
make compose-safe
```## Installing directly
### Create and start the PostgreSQL database server
#### Using preconfigured Postgresql Docker container (Recommended)
> Please make sure you have Docker installed!
Run `make startdb` to create and start the PostgreSQL server in a Docker container. In the default configuration, it listens on port 5342 exposed from Docker container.
#### Manual setup (painful and error-prone)
> You can also use a script to this for you - find it in `scripts/db_setup.sh`. You'll need to modify any hardcoded variables if you change the corresponding ones in `owtf/settings.py`.
Start the postgreSQL server,
* macOS: `brew install postgresql` and `pg_ctl -D /usr/local/var/postgres start`
* Kali: `sudo systemctl enable postgresql; sudo systemctl start postgresql or sudo service postgresql start`Create the `owtf_db_user` user,
* macOS: `psql postgres -c "CREATE USER $db_user WITH PASSWORD '$db_pass';"`
* Kali: `sudo su postgres -c "psql -c \"CREATE USER $db_user WITH PASSWORD '$db_pass'\""`Create the database,
* macOS: `psql postgres -c "CREATE DATABASE $db_name WITH OWNER $db_user ENCODING 'utf-8' TEMPLATE template0;"`
* Kali: `sudo su postgres -c "psql -c \"CREATE DATABASE $db_name WITH OWNER $db_user ENCODING 'utf-8' TEMPLATE template0;\""`### Installing OWTF
```
git clone https://github.com/owtf/owtf
cd owtf
python3 setup.py develop
make startdb
make setup-web
owtf
open `localhost:8019` in the web browser for the OWTF web interface or `owtf --help` for all available commands.
```# Features
- **Resilience**: If one tool crashes **OWTF**, will move on to the
next tool/test, saving the partial output of the tool until it
crashed.
- **Flexible**: Pause and resume your work.
- **Tests Separation**: **OWTF** separates its traffic to the target
into mainly 3 types of plugins:
- **Passive** : No traffic goes to the target
- **Semi Passive** : Normal traffic to target
- **Active**: Direct vulnerability probing
- Extensive REST API.
- Has almost complete OWASP Testing Guide(v3, v4), Top 10, NIST, CWE
coverage.
- **Web interface**: Easily manage large penetration engagements
easily.
- **Interactive report**:
- **Automated** plugin rankings from the tool output, fully
configurable by the user.
- **Configurable** risk rankings
- **In-line notes editor** for each plugin.# License
Checkout [LICENSE](LICENSE.md)
# Code of Conduct
Checkout [Code of Conduct](CODE_OF_CONDUCT.md)
# Links
- [Project homepage](http://owtf.github.io/)
- [IRC](http://webchat.freenode.net/?randomnick=1&channels=%23owtf&prompt=1&uio=MTE9MjM20f)
- [Wiki](https://www.owasp.org/index.php/OWASP_OWTF)
- [Slack](https://join.slack.com/t/owasp/shared_invite/enQtNDI5MzgxMDQ2MTAwLTEyNzIzYWQ2NDZiMGIwNmJhYzYxZDJiNTM0ZmZiZmJlY2EwZmMwYjAyNmJjNzQxNzMyMWY4OTk3ZTQ0MzFhMDY) and join channel
`#project-owtf`
- [User Documentation](http://docs.owtf.org/en/latest/)
- [Youtube channel](https://www.youtube.com/user/owtfproject)
- [Slideshare](http://www.slideshare.net/abrahamaranguren/presentations)
- [Blog](http://blog.7-a.org/search/label/OWTF)