Next-Gen WebSocket Security Scanning
WSHawk is an enterprise-grade WebSocket security scanner featuring Smart Payload Evolution, a Headless DOM Invader for real XSS confirmation, SSO Auth Flow Recording, and deep OAST integration. v3.0.3 ships a Desktop app with 22 web pentesting tools and zero-false-positive verification powered by headless Chromium.
$ wshawk ws://target.com/ws
[*] WSHawk v3.0.3 - Enterprise Security Scanner
[*] Initializing ResilientSession with Circuit Breaker...
[*] Learning Phase: Monitoring 5s of traffic...
[+] Format Identified: JSON (Nested Schema)
[*] Running SPE: Smart Payload Evolution Engine...
[+] DOM Invader: XSS Confirmed via Headless Chrome
[!] ALERT: Blind XSS Found (DOM Verified, No False Positives)
[!] ALERT: Out-of-Band XXE Detected (OAST)
[*] Pushing results to Jira & DefectDojo...
[+] Scan complete. Dashboard updated at port 5000.
Enterprise-Grade Capabilities
Sophisticated tools designed for the modern security landscape.
CyberNode: Visual Attack Chaining
Drag-and-drop canvas to build multi-step attack pipelines. Connect Subdomain Finder to Dir Scanner to Auth Builder. Export chains as .hawkchain templates.
Multiplayer Red Team Mode
Create or join rooms with 6-character codes. Live operator roster, shared activity feed, and collaborative notes synced across the entire team in real-time.
AI Highlight-to-Hack
Highlight any JSON or XML parameter in ReqForge, right-click, and instantly generate context-aware payloads that are auto-populated directly into the Payload Blaster.
DOM Invader
Headless Chromium engine renders WebSocket responses and confirms real JavaScript execution β zero false positives on XSS findings.
Auth Flow Automation
Record SSO and OAuth login flows in a visible browser, then replay them headlessly to keep long-running fuzzing sessions authenticated automatically.
Smart Payload Evolution
Genetic algorithm that mutates 22,000+ payloads based on server feedback loops, WAF signals, and timing anomalies to find bypasses other scanners miss.
OAST Integration
Professional Out-of-Band testing via interact.sh for high-precision blind XXE and SSRF detection that response-only scanners cannot catch.
Resilience Control
Production-grade ResilientSession with circuit breakers and exponential backoff for stable, uninterrupted scanning against production targets.
Enterprise Ecosystem
Automated integration with Jira, DefectDojo, SARIF export, and multi-platform Webhooks for SOC and CI/CD pipeline integration.
Security Showcase
Explore the inner workings of our advanced scanning engine.
1# WSHawk automatically maps the protocol2scanner = WSHawkV2("ws://target.com/api")3await scanner.connect()4 5# Output snippet:6[*] Handshake complete. Upgrade header validated.7[*] Monitoring heartbeat traffic...8[+] Format identified: JSON with nested schemas.9[*] Initializing field-aware injection points...Getting Started
Deploy WSHawk v3.0.3 in seconds β via pip, Desktop app, or Docker.
CLI Quickstart
$ pip install wshawk$ wshawk ws://target.com/wsPython API
from wshawk.scanner_v2 import WSHawkV2import asyncioasync def scan(): scanner = WSHawkV2(url) await scanner.run_heuristic_scan()Frequently Asked Questions
What is WSHawk?
WSHawk v3.0.3 is a production-grade WebSocket security scanner and desktop pentest suite. New in v3.0.3: CyberNode visual attack chaining, Multiplayer red team mode, AI Highlight-to-Hack payload generation, and the Headless DOM Invader for zero-false-positive XSS confirmation.
What is CyberNode and how does it work?
CyberNode is a drag-and-drop graphical canvas inside the Desktop app that lets you build multi-step attack pipelines. You connect tool blocks (Subdomain Finder, Dir Scanner, Auth Builder, S3 Dumper) with output lines, add conditional logic gates, and execute the full chain with a single click. Chains are saved as .hawkchain files and can be shared with the community as standardized exploit templates.
How does Multiplayer Mode work?
One operator creates a room and receives a 6-character code. Up to 6 operators can join the same room from separate WSHawk Desktop instances. All scan events, vulnerability findings, and endpoint discoveries broadcast to the team in real-time. Notes are collaboratively edited with 300ms debounced sync. Each operator has a colored avatar and status indicator showing which tool tab they are on.
What is AI Highlight-to-Hack?
In the ReqForge editor, you highlight any parameter value (for example, a JSON integer field), right-click, and select Generate AI Payloads. WSHawk reads the full surrounding context β JSON structure, field type, nesting depth β and generates a set of perfectly encoded, context-aware payloads for SQLi, NoSQLi, IDOR, and prototype pollution. Those payloads are automatically inserted into the Payload Blaster template with the injection marker in place.
How does the DOM Invader eliminate XSS false positives?
The DOM Invader renders each WebSocket response inside a sandboxed headless Chromium page and instruments window.alert, window.eval, and a MutationObserver to detect real JavaScript execution. Only payloads that actually fire in the browser are classified as confirmed XSS. An auth flow recorder also handles SSO and OAuth session expiry automatically during long fuzzing runs.
Can I integrate WSHawk into my CI/CD?
Yes. WSHawk supports automated pushes to Jira, DefectDojo, and structured webhooks, along with SARIF exports for GitHub Security integration. The Docker image can be run headlessly in any CI pipeline.
Who developed WSHawk?
WSHawk was architected and developed by Regaan, a Security Researcher and founder of Rot Hackers.
WSHawk v3.0.3 - Enterprise WebSocket Security Scanner
WSHawk is an enterprise-grade WebSocket security scanner developed by Regaan. Architected for high-concurrency environments, it provides deep heuristic analysis, autonomous payload evolution, and professional-grade vulnerability verification for red teams and corporate security operations.
Smart Payload Evolution & Genetic Fuzzing
WSHawk introduces a breakthrough Smart Payload Evolution (SPE) engine. Unlike static scanners, WSHawk's genetic algorithm learns from server response heuristics to mutate its 22,000+ payload database in real-time, pivoting attack strategies to bypass sophisticated WAFs and intrusion detection systems.
Cross-Platform Desktop Application & Web Pentest Toolkit
WSHawk v3.0.3 includes a native Desktop application (Windows, macOS, Linux) that extends the core WebSocket scanner with a comprehensive suite of 22+ integrated web security tools. Built on an Electron framework with a high-performance Python sidecar, the desktop environment provides a centralized workspace for modern offensive security testing.
The integrated **Web Pentest Toolkit** includes: - **Network Discovery**: Port Scanner, Subdomain Finder, and Web Crawler. - **Vulnerability Probing**: SSRF Prober, CORS Security Tester, and JWT/Cookie Analyzer. - **Attack Modules**: High-speed HTTP Fuzzer, Directory Brute-forcer, and Exploitation Lab. - **Interception**: Real-time WebSocket MitM Interceptor and Frame Editor.
Industry-Leading Verification & OAST
Ensure zero false positives with multi-stage verification. WSHawk synchronizes with Playwright for headless browser execution of XSS payloads and leverages advanced OAST (Out-of-Band Application Security Testing) to detect blind SSRF and XXE vulnerabilities.
Developed by Regaan | Powered by Rot Hackers
As the flagship tool in the Rot Hackers offensive security ecosystem, WSHawk represents the pinnacle of WebSocket security research. It empowers security engineers to conduct deep-dive audits with automated Jira integration and professional SARIF/HTML reporting.
Key Capabilities
- CyberNode: drag-and-drop visual attack chaining with .hawkchain export
- Multiplayer Red Team Mode: shared rooms, live roster, activity feed, collaborative notes
- AI Highlight-to-Hack: context-aware payload generation from ReqForge right-click menu
- DOM Invader: headless Chromium confirms real XSS execution, zero false positives
- Auth Flow Recorder: capture SSO/OAuth sessions and replay headlessly
- Auto session reconnect during long Payload Blaster operations
- Smart Payload Evolution with feedback-driven genetic mutations
- Advanced OAST blind vulnerability detection (interact.sh)
- Persistent Web Dashboard with SQLite WAL-mode storage
- Enterprise Integrations: Jira, DefectDojo, & Webhooks
- ResilientSession with Circuit Breaker and Adaptive Backoff
- Desktop app for Windows, macOS, and Linux
- 22 web pentesting tools (actively maintained)