Hx-H.A.W.K.S - High Accuracy Web Keywords Scanner
-------------------------------------------------
"Scan. Detect. Dominate."
Hx-H.A.W.K.S is a high-performance CLI and API-based tool built for security researchers, red teamers, and bug bounty hunters. It scans thousands of URLs, searches for specified keywords in the HTTP responses, and detects possible vulnerability footprints. All with color-coded terminal output, powerful concurrency options, and customizable formats.
“Scan. Detect. Dominate.”
Features
📌 Overview
Hx-H.A.W.K.S is a high-performance CLI and API-based tool built for security researchers, red teamers, and bug bounty hunters. It scans thousands of URLs, searches for specified keywords in the HTTP responses, and detects possible vulnerability footprints. All with color-coded terminal output, powerful concurrency options, and customizable formats.
⚙️ Features
- Keyword-based response scanning (e.g., `admin`, `password`, `flag{`, etc.)
- Super-fast concurrency with goroutines (unlimited URLs)
- Multiple output formats: plain, JSON, full reports
- Color-coded output for quick terminal scanning
- Smart filters, retries, timeouts, custom headers
- Built-in API server (SSE + RESTful) for real-time results
- ✅ Keyword-based response scanning (e.g., `admin`, `password`, `flag{`, etc.)
- ⚡ Super-fast concurrency with goroutines (unlimited URLs)
- 🎯 Multiple output formats: plain, JSON, full reports
- 🌈 Color-coded output for quick terminal scanning
- 🧠 Smart filters, retries, timeouts, custom headers
- 🌐 Built-in API server (SSE + RESTful) for real-time results
- 🛠️ Ready for integration into future tools like Fruttry, Hx-Bunny, or custom dashboards
Installation
Make sure you have Go installed. Then install Hx-H.A.W.K.S using:
📦 Installation
Go-Lang Installer (Self-Install)
go install github.com/nxneeraj/hx-hawks@latest
Manual Installation
git clone https://github.com/nxneeraj/hx-hawks.git
cd hx-hawks
go build -o hx-hawks main.go
CLI Usage
🧪 CLI Usage
./hx-hawks -f targets.txt -o vulnerable.txt --ck "admin,password,login"
Key Flags
🔧 Key Flags
| Flag | Description |
-f <file> | Input file of URLs (one per line) |
--ck "<k1>,<k2>" | Comma-separated keywords |
--ck "<k1>,<k2>" | Comma-separated keywords to check for |
-o <file> | Plain text output (vulnerable URLs only) |
-o-json <file> | Save vulnerable data as JSON |
-o-response <file> | Save response with each vulnerable URL |
-o-all <file> | Save all data (safe + vulnerable) |
-o-all-json <file> | JSON output with metadata, IP, status |
--threads <num> | Goroutines to use (default 10) |
--threads <num> | Number of goroutines to use (default 10) |
--timeout <s> | Timeout per URL (default 5s) |
--delay <ms> | Delay between requests |
--api | Enable API server mode |
--port <num> | Set custom API port (default 8080) |
--verbose | Print all scanning details |
Example Use Cases
📤 Output Formats
-o (Plain Vulnerable URLs)
https://target.com/login
https://admin.site.com
-o-json (Matched Results)
{
"url": "https://target.com/login",
"matched_keywords": ["login", "admin"],
"response": "<html>Welcome admin</html>"
}
-o-all-json (Full Metadata)
{
"url": "https://target.com/login",
"status_code": 200,
"ip": "93.184.216.34",
"matched_keywords": ["admin"],
"response": "<html>Admin panel</html>",
"is_vulnerable": true,
"timestamp": "2025-05-02T14:33:22Z"
}
🌐 API Mode
Start the server with your desired scan parameters:
./hx-hawks --api -f targets.txt --ck "password,login" --port 7171
📡 API Endpoints
| Endpoint | Method | Description |
/scan/start | POST | Start new scan (JSON payload) |
/scan/status/{jobID} | GET | Get scan progress |
/scan/result/{jobID} | GET | Get full results |
/scan/stream/{jobID} | GET | Real-time events via SSE |
🚀 Example Use Cases
# Basic keyword scan
hx-hawks -f urls.txt --ck "admin,password"
# Save matched responses
hx-hawks -f urls.txt -o-response match.txt --ck "error,flag{"
# API mode on port 9000
hx-hawks --api -f urls.txt --ck "sql,injection" --port 9000