WebSocket and Web App Testing for Stateful Targets
WSHawk v4.0.0 is an open-source platform for authorized WebSocket security testing, replay, AuthZ diffing, race testing, browser pairing, evidence export, and desktop web pentest workflows.
$ wshawk ws://target.example/ws
[*] WSHawk v4.0.0
[*] Establishing baseline connection and capturing frame families...
[+] Project record created for realtime-saas
[*] Browser companion paired for app.realtime.test
[+] Replay completed with stored identity context
[!] AuthZ diff surfaced a cross-tenant data path
[!] Race test accepted a duplicate state-changing action
[*] Evidence bundle prepared for local export
Current Capabilities
WSHawk v4 focuses on stateful web and realtime application testing, not generic marketing noise.
Desktop-First Workflows
Electron plus Python operator surface for projects, traffic, replay, evidence, and web pentest operations.
WebSocket Replay
Reproduce captured frames against live targets with stored handshake and identity context instead of one-shot payload guesses.
AuthZ Diff
Compare the same HTTP or WebSocket action across saved identities to expose cross-role and cross-tenant behavior gaps.
Race Testing
Run repeated or parallel attacks against state-changing actions to find replay-before-invalidation and duplicate execution windows.
Browser Companion Pairing
Scoped browser pairing for handshake capture and browser-authenticated workflows without a long-lived extension bridge token.
Web Pentest Workspace
Crawler, request tooling, fuzzing, headers, redirects, SSRF, TLS, and related HTTP checks in the same local project.
Evidence Bundles
Project-backed findings, notes, traffic, provenance, and tamper-evident export metadata designed for later review and handoff.
Validation Labs
Local realtime SaaS labs for full-stack WebSocket, Socket.IO, and GraphQL subscription scenarios used for regression proof.
CLI and Integrations
Compatibility CLI, web surfaces, JSON and report exports, plus Jira, DefectDojo, and webhook handoff when you need them.
WSHawk In Practice
These are the operations the current release is actually built around.
1# Start a project-backed workflow2POST /platform/projects3POST /api/extension/pair4 5[+] Project created: realtime-saas6[+] Browser companion paired for app.realtime.test7[+] Handshake context stored in project timelineStart with v4
The quickest path is still the CLI. The strongest path is the desktop app plus project-backed workflows and local validation labs.
CLI Quick Pass
$ pip install wshawk$ wshawk ws://target.example/ws$ wshawk-interactiveValidation Labs
$ git clone https://github.com/regaan/wshawk$ cd wshawk$ ./venv/bin/python validation/run_validation.pyFrequently Asked Questions
What is WSHawk v4.0.0?
WSHawk v4.0.0 is an open-source WebSocket security testing and web pentest platform. The current release centers on desktop workflows, project-backed storage, replay, AuthZ diffing, race testing, browser pairing, evidence export, and local validation labs.
Is the desktop app now the main workflow?
Yes. The CLI still exists and remains useful, but the most complete v4 workflow lives in the desktop app plus the local bridge, project store, and validation labs.
What does the browser companion do?
The browser companion pairs with the local bridge for scoped handshake capture. It helps bring browser-authenticated WebSocket context into the same local project without exposing a long-lived bridge token inside the extension.
Can WSHawk test HTTP as well as WebSocket targets?
Yes. v4 keeps HTTP request tooling, replay, AuthZ diff, race testing, and web pentest checks in the same project as WebSocket workflows so stateful apps can be tested end to end.
How should I interpret WSHawk's browser-side XSS evidence path?
No honest tool should promise that. WSHawk can collect Playwright-assisted browser evidence for reflected and DOM-style payloads, but the current v4 docs describe this as evidence collection that still needs operator review, not as a blanket zero-false-positive guarantee.
Does the release include validation targets?
Yes. The repo includes local validation labs for full-stack realtime SaaS, Socket.IO, and GraphQL subscription scenarios so the platform can be regression-tested against known flows.
Can findings be pushed into other systems?
WSHawk includes exports and integration paths for Jira, DefectDojo, and webhooks. The local evidence bundle is still the primary source of truth because it keeps replay context, identities, notes, and timeline data together.
What license does WSHawk use?
The current project is released under AGPL-3.0.
WebSocket Security Testing for Stateful Applications
WSHawk v4.0.0 is built for applications where state, identity, asynchronous behavior, and browser-authenticated context matter more than one-shot payload reflection. That makes it useful for chat systems, collaboration platforms, trading interfaces, internal dashboards, subscription APIs, and other realtime SaaS targets.
Desktop Workflows Instead of Disposable Scans
The current release is centered on the desktop app and local project store. Instead of treating each test as an isolated scan, WSHawk keeps identities, traffic, findings, notes, and exports inside one reusable project record. Replay, AuthZ diffing, and race testing all build on that same local context.
HTTP and WebSocket in the Same Operation Record
Many modern targets mix browser bootstrapping, HTTP APIs, and live WebSocket actions. WSHawk v4 keeps those paths together so operators can capture traffic, replay requests, compare cross-identity behavior, and export evidence from the same workflow instead of bouncing between unrelated tools.
Validation Labs and Evidence Exports
The repository ships with local validation labs for full-stack realtime SaaS, Socket.IO, and GraphQL subscription scenarios. Export bundles include evidence and provenance data so later review is easier and tampering is easier to detect.
Honest Positioning
WSHawk is an offensive web and realtime application security tool. It is not a general purpose C2 framework or a promise of perfect automated verification. The strongest value in v4 comes from stateful replay, comparison, race testing, and evidence-backed review.
Key Capabilities
- Desktop-first project workflows for WebSocket and HTTP targets
- WebSocket replay, AuthZ diff, and race testing
- HTTP replay, request forging, and web pentest workspace tooling
- Scoped browser companion pairing for handshake capture
- Playwright-assisted browser evidence collection for XSS review
- Local validation labs for websocket, Socket.IO, and GraphQL flows
- Project-backed notes, timeline data, and evidence exports
- Integrations for Jira, DefectDojo, webhooks, and structured exports