HyperGod-X
Cyber Security Research & Tools

> Build faster. Test smarter. Hack ethically.

    // Welcome to the nexus of innovation and security.
    const mission = 'To craft open-source tools that empower security professionals and developers worldwide.';
    const motto = 'Sniff the weak, strike with precision.';
    function explore() {
        return 'Dive into our projects and blog posts below.';
    }
Explore Our Work

About HyperGod-X

Forging the future of cyber security, one tool at a time.

HyperGod-X Logo

Our Mission

HyperGod-X, led by Neeraj Sah (nxneeraj), is a collective focused on developing high-performance, open-source tools for the cyber security community. Our projects are born from real-world needs in security research, red teaming, and bug bounty hunting.

We blend speed, clarity, and beautiful design to simplify complex security tasks. Our mission is to empower developers, security professionals, and enthusiasts with tools that are not only powerful but also a pleasure to use.

> Keep Moving Forward

Featured Tools

    Hx-H.A.W.K.S - High Accuracy Web Keywords Scanner
    -------------------------------------------------
    "Scan. Detect. Dominate."
                            

Hx-H.A.W.K.S

A high-performance CLI and API-based tool built for security researchers, red teamers, and bug bounty hunters. It scans thousands of URLs, searches for specified keywords in the HTTP responses, and detects possible vulnerability footprints.

Key Features:
  • Keyword-based response scanning
  • Super-fast concurrency with goroutines
  • Multiple output formats (plain, JSON, full reports)
  • Color-coded CLI output
  • Built-in API server (SSE + RESTful)
View Full Details →
Installation (Go):
go install github.com/nxneeraj/hx-hawks@latest
Basic Usage:
./hx-hawks -f targets.txt --ck "admin,password"
   ██╗  ██╗██╗  ██╗      ███████╗ ██████╗ █████╗ ███╗   ██╗███╗   ██╗███████╗██████╗
    ██║  ██║╚██╗██╔╝      ██╔════╝██╔════╝██╔══██╗████╗  ██║████╗  ██║██╔════╝██╔══██╗
    ███████║ ╚███╔╝█████╗ ███████╗██║     ███████║██╔██╗ ██║██╔██╗ ██║█████╗  ██████╔╝
    ██╔══██║ ██╔██╗╚════╝ ╚════██║██║     ██╔══██║██║╚██╗██║██║╚██╗██║██╔══╝  ██╔══██╗
    ██║  ██║██╔╝ ██╗      ███████║╚██████╗██║  ██║██║ ╚████║██║ ╚████║███████╗██║  ██║
    ╚═╝  ╚═╝╚═╝  ╚═╝      ╚══════╝ ╚═════╝╚═╝  ╚═╝╚═╝  ╚═══╝╚═╝  ╚═══╝╚══════╝╚═╝  ╚═╝
                            

HyperScanner

A powerful and futuristic HTTP status code scanner that takes a list of IPs or URLs and classifies their responses into structured folders and files. Designed for speed, clarity, and beauty.

Key Features:
  • Scans IPs, Domains, and URLs
  • Organized output by status code
  • Detailed logging
  • Color-coded CLI
  • CORS vulnerability checking
  • Cross-platform
View Full Details →
Installation (Go):
go install github.com/hx-corp/hxscanner@latest
Basic Usage:
hxscanner -i ips.txt

URLShort

An intelligent tool written in Go to split, shorten, and fuzz URLs for automation, testing, and security purposes. Automate recon, parameter manipulation, and payload injection quickly and effectively.

Key Features:
  • Generate recursive URL variations
  • Append payloads from CLI or file
  • Target query strings and path segments
  • Deduplicate results
  • Ideal for recon, fuzzing, XSS, IDOR, Path Traversal
View Full Details →
Installation (Go):
go install github.com/Hx-Corp/urlshort@latest
Basic Usage:
urlshort -f urls.txt -o out.txt -x "=&" -p

Latest Articles

Insights, tutorials, and announcements from our team.

Introducing Hx-H.A.W.K.S: High-Accuracy Web Keywords Scanner

Oct 15, 2025

Discover Hx-H.A.W.K.S, an ultra-fast, concurrent vulnerability scanner written in Go. Learn how it scans thousands of URLs for specific keywords, detects vulnerability footprints, and provides customizable, color-coded output for efficient analysis.

Go Security
Read More →

Deep Dive into HyperScanner: A Futuristic HTTP Status & CORS Scanner

Sep 28, 2025

HyperScanner (hxscanner) revolutionizes HTTP response analysis. This post explores its powerful features, including organized output based on status codes, detailed logging, and the integrated CORS misconfiguration checker.

Go Recon CORS
Read More →

URLShort: More Than a Shortener - A Tool for Fuzzing and Recon

Sep 10, 2025

Unleash the power of URL manipulation for security testing. URLShort intelligently splits, varies, and appends payloads to URLs, creating a massive list of test cases for fuzzing, XSS, IDOR, and path traversal vulnerabilities from a simple input file.

Go Fuzzing
Read More →

Our Projects

Open-source tools built for the community.

Hx-H.A.W.K.S

High-Accuracy Web Keywords Scanner. A high-performance CLI and API-based tool to find vulnerability footprints in web responses.

Learn More →

HyperScanner

A powerful HTTP status code scanner that organizes responses into structured folders and includes a CORS vulnerability checker.

Learn More →

URLShort

Advanced URL shortener and parameter generator for creating fuzzing vectors, testing for XSS, IDORs, and more.

Learn More →

Get In Touch

Have a question, suggestion, or want to collaborate?

← Back to Projects

Hx-H.A.W.K.S

High Accuracy Web Keywords Scanner

                        
    Hx-H.A.W.K.S - High Accuracy Web Keywords Scanner
    -------------------------------------------------
    "Scan. Detect. Dominate."
                        

Hx-H.A.W.K.S is a high-performance CLI and API-based tool built for security researchers, red teamers, and bug bounty hunters. It scans thousands of URLs, searches for specified keywords in the HTTP responses, and detects possible vulnerability footprints. All with color-coded terminal output, powerful concurrency options, and customizable formats.

“Scan. Detect. Dominate.”

Features

📌 Overview

Hx-H.A.W.K.S is a high-performance CLI and API-based tool built for security researchers, red teamers, and bug bounty hunters. It scans thousands of URLs, searches for specified keywords in the HTTP responses, and detects possible vulnerability footprints. All with color-coded terminal output, powerful concurrency options, and customizable formats.

⚙️ Features

  • Keyword-based response scanning (e.g., `admin`, `password`, `flag{`, etc.)
  • Super-fast concurrency with goroutines (unlimited URLs)
  • Multiple output formats: plain, JSON, full reports
  • Color-coded output for quick terminal scanning
  • Smart filters, retries, timeouts, custom headers
  • Built-in API server (SSE + RESTful) for real-time results
  • Keyword-based response scanning (e.g., `admin`, `password`, `flag{`, etc.)
  • Super-fast concurrency with goroutines (unlimited URLs)
  • 🎯 Multiple output formats: plain, JSON, full reports
  • 🌈 Color-coded output for quick terminal scanning
  • 🧠 Smart filters, retries, timeouts, custom headers
  • 🌐 Built-in API server (SSE + RESTful) for real-time results
  • 🛠️ Ready for integration into future tools like Fruttry, Hx-Bunny, or custom dashboards

Installation

Make sure you have Go installed. Then install Hx-H.A.W.K.S using:

📦 Installation

Go-Lang Installer (Self-Install)

go install github.com/nxneeraj/hx-hawks@latest

Manual Installation

git clone https://github.com/nxneeraj/hx-hawks.git cd hx-hawks go build -o hx-hawks main.go

CLI Usage

🧪 CLI Usage

./hx-hawks -f targets.txt -o vulnerable.txt --ck "admin,password,login"

Key Flags

🔧 Key Flags

FlagDescription
-f <file>Input file of URLs (one per line)
--ck "<k1>,<k2>"Comma-separated keywords
--ck "<k1>,<k2>"Comma-separated keywords to check for
-o <file>Plain text output (vulnerable URLs only)
-o-json <file>Save vulnerable data as JSON
-o-response <file>Save response with each vulnerable URL
-o-all <file>Save all data (safe + vulnerable)
-o-all-json <file>JSON output with metadata, IP, status
--threads <num>Goroutines to use (default 10)
--threads <num>Number of goroutines to use (default 10)
--timeout <s>Timeout per URL (default 5s)
--delay <ms>Delay between requests
--apiEnable API server mode
--port <num>Set custom API port (default 8080)
--verbosePrint all scanning details

Example Use Cases

📤 Output Formats

-o (Plain Vulnerable URLs)

https://target.com/login https://admin.site.com

-o-json (Matched Results)

{ "url": "https://target.com/login", "matched_keywords": ["login", "admin"], "response": "<html>Welcome admin</html>" }

-o-all-json (Full Metadata)

{ "url": "https://target.com/login", "status_code": 200, "ip": "93.184.216.34", "matched_keywords": ["admin"], "response": "<html>Admin panel</html>", "is_vulnerable": true, "timestamp": "2025-05-02T14:33:22Z" }

🌐 API Mode

Start the server with your desired scan parameters:

./hx-hawks --api -f targets.txt --ck "password,login" --port 7171

📡 API Endpoints

EndpointMethodDescription
/scan/startPOSTStart new scan (JSON payload)
/scan/status/{jobID}GETGet scan progress
/scan/result/{jobID}GETGet full results
/scan/stream/{jobID}GETReal-time events via SSE

🚀 Example Use Cases

# Basic keyword scan
hx-hawks -f urls.txt --ck "admin,password"

# Save matched responses
hx-hawks -f urls.txt -o-response match.txt --ck "error,flag{"

# API mode on port 9000
hx-hawks --api -f urls.txt --ck "sql,injection" --port 9000
← Back to Projects

HyperScanner

IP/Domain/URL Scanner with CORS Check

                        
   ██╗  ██╗██╗  ██╗      ███████╗ ██████╗ █████╗ ███╗   ██╗███╗   ██╗███████╗██████╗
    ██║  ██║╚██╗██╔╝      ██╔════╝██╔════╝██╔══██╗████╗  ██║████╗  ██║██╔════╝██╔══██╗
    ███████║ ╚███╔╝█████╗ ███████╗██║     ███████║██╔██╗ ██║██╔██╗ ██║█████╗  ██████╔╝
    ██╔══██║ ██╔██╗╚════╝ ╚════██║██║     ██╔══██║██║╚██╗██║██║╚██╗██║██╔══╝  ██╔══██╗
    ██║  ██║██╔╝ ██╗      ███████║╚██████╗██║  ██║██║ ╚████║██║ ╚████║███████╗██║  ██║
    ╚═╝  ╚═╝╚═╝  ╚═╝      ╚══════╝ ╚═════╝╚═╝  ╚═╝╚═╝  ╚═══╝╚═╝  ╚═══╝╚══════╝╚═╝  ╚═╝
                        

HyperScanner is a powerful and futuristic HTTP status code scanner that takes a list of IPs or URLs and classifies their responses into structured folders and files. Designed for speed, clarity, and beauty, HyperScanner simplifies HTTP response analysis with an organized and efficient workflow.

Key Features

✨ Features

  • Scan IP & URLs Lists
  • Organized Output by Status Code (2xx, 3xx, 4xx...)
  • Detailed Logs (exist, invalid, log)
  • Color-coded CLI (Terminal Output)
  • CORS Vulnerability Integration
  • Cross-Platform (Windows, Linux, macOS)
  • 🔍 Scan IP & URLs Lists: Quickly scans any list of IPs or URLs and fetches their HTTP status codes.
  • 🗂️ Organized Output: Automatically creates folder structures based on HTTP status codes (1xx, 2xx, 3xx, 4xx, 5xx).
  • 📁 File-Based Response Storage: Saves each response into categorized files, such as `200.txt`.
  • Detailed Logs: Cleanly tracks results in `ip_exist.txt`, `ip_invalid.txt`, and a comprehensive `log.txt`.
  • 🎨 Enhanced CLI: Color-coded status codes for better readability.
  • 🌐 CORS Integration: Detects and logs CORS headers like `Access-Control-Allow-Origin`.
  • 💻 Cross-Platform: Works flawlessly on Windows, Linux, and macOS.

Installation

🚀 Installation

Make sure you have Go 1.19+ installed. Then install HyperScanner using:

go install github.com/hx-corp/hxscanner@latest

Usage

🛠️ Usage

Prepare a text file (`ips.txt`) containing a list of IPs or URLs, one per line. Run HyperScanner with:

hxscanner -i ips.txt

You can also specify an output directory:

hxscanner -i ips.txt -o my_results

CLI Options

📋 CLI Options

OptionDescription
-i <file>Input file with targets (IPs/Domains/URLs), one per line.
-f <file>Alias for -i.
-w <number>Number of concurrent scanning workers (default: number of CPU cores).
-w <number>Number of concurrent workers (default: number of CPU cores).
-t <duration>HTTP request timeout (default: 5s).
-qQuiet mode: suppress individual results (except errors/warnings).
--corsPerform basic CORS vulnerability check on successful targets.
-hShow the help message.

🔮 Future Plans

  • 🎯 Add terminal icons and detailed status code categories.
  • 🖥️ Complete and release the GUI version.
  • ⚡ Optimize performance for extremely large input lists.
  • 🌍 Add proxy and multi-threaded support.
← Back to Blog

Deep Dive into HyperScanner

A Futuristic HTTP Status & CORS Scanner

                        
   ██╗  ██╗██╗  ██╗      ███████╗ ██████╗ █████╗ ███╗   ██╗███╗   ██╗███████╗██████╗
    ██║  ██║╚██╗██╔╝      ██╔════╝██╔════╝██╔══██╗████╗  ██║████╗  ██║██╔════╝██╔══██╗
    ███████║ ╚███╔╝█████╗ ███████╗██║     ███████║██╔██╗ ██║██╔██╗ ██║█████╗  ██████╔╝
    ██╔══██║ ██╔██╗╚════╝ ╚════██║██║     ██╔══██║██║╚██╗██║██║╚██╗██║██╔══╝  ██╔══██╗
    ██║  ██║██╔╝ ██╗      ███████║╚██████╗██║  ██║██║ ╚████║██║ ╚████║███████╗██║  ██║
    ╚═╝  ╚═╝╚═╝  ╚═╝      ╚══════╝ ╚═════╝╚═╝  ╚═╝╚═╝  ╚═══╝╚═╝  ╚═══╝╚══════╝╚═╝  ╚═╝
                        

HyperScanner is a powerful and futuristic HTTP status code scanner that takes a list of IPs or URLs and classifies their responses into structured folders and files. Designed for speed, clarity, and beauty, HyperScanner simplifies HTTP response analysis with an organized and efficient workflow.

Features

  • 🔍Scan IP & URLs Lists: Quickly scans any list of IPs or URLs and fetches their HTTP status codes.
  • 🗂️Organized Output: Automatically creates folder structures based on HTTP status codes (1xx, 2xx, 3xx, 4xx, 5xx).
  • 📁File-Based Response Storage: Saves each response into categorized files, such as `200.txt`.
  • Detailed Logs: Cleanly tracks results in `ip_exist.txt`, `ip_invalid.txt`, and a comprehensive `log.txt`.
  • 🎨Enhanced CLI: Color-coded status codes for better readability.
  • 🌐CORS Integration: Detects and logs CORS headers like `Access-Control-Allow-Origin`.
  • 💻Cross-Platform: Works flawlessly on Windows, Linux, and macOS.

Installation

Make sure you have Go 1.19+ installed. Then install HyperScanner using:

go install github.com/hx-corp/hxscanner@latest

Usage

Prepare a text file (`ips.txt`) containing a list of IPs or URLs, one per line. Run HyperScanner with:

hxscanner -i ips.txt

CLI Options

OptionDescription
-i <file>Input file with targets (IPs/Domains/URLs), one per line.
-f <file>Alias for -i.
-w <number>Number of concurrent scanning workers (default: number of CPU cores).
-t <duration>HTTP request timeout (default: 5s).
-qQuiet mode: suppress individual results (except errors/warnings).
--corsPerform basic CORS vulnerability check on successful targets.
-hShow the help message.

Output Structure

HyperScanner organizes the output beautifully:

output/
├── 1xx/
│   └── 100.txt
├── 2xx/
│   ├── 200.txt
│   └── ...
├── 3xx/
│   └── 301.txt
├── 4xx/
│   └── 404.txt
├── 5xx/
│   └── 500.txt
├── ip_exist.txt
├── ip_invalid.txt
├── log.txt
└── cors_detected.txt
← Back to Projects

URLShort

Advanced URL Shortener & Parameter Generator

URLShort is a powerful and intelligent tool written in Go to split, shorten, and fuzz URLs for automation, testing, and security purposes. It's built to automate recon, parameter manipulation, and payload injection quickly and effectively. URLShort is a powerful and intelligent tool written in Go to split, shorten, and fuzz URLs for automation, testing, and security purposes. Built with ❤️ by Neeraj Sah to help you automate recon, parameter manipulation, and payload injection — quickly and effectively.

Why Use It?

🙋‍♂️ Who Is It For?

  • 🧑‍💻 Web Developers — Analyze and test URL behavior.
  • 🐞 Bug Bounty Hunters — Generate fuzzable URL vectors fast.
  • 🛡 Security Professionals — Inject payloads into endpoints for XSS/IDOR testing.
  • 🧪 QA Engineers — Automate URL manipulation for test coverage.
  • 🧰 Red Teamers & Recon Experts — Enhance endpoint discovery and testing.

🌟 Features

  • Generate recursive URL variations
  • Append payloads from CLI or file
  • Target both query strings and path segments
  • Deduplicate, output to file, and integrate in scripts
  • Ideal for recon, fuzzing, XSS testing, path traversal, etc.
  • Ideal for recon, fuzzing, XSS, IDOR, Path Traversal

Installation

Make sure you have Go installed. Then install URLShort using:

⚡️ Installation

Global Install via Go (Recommended)

go install github.com/Hx-Corp/urlshort@latest

Ensure your $GOPATH/bin is in your system PATH:

export PATH="$PATH:$(go env GOPATH)/bin"

Usage

🚀 Usage

urlshort -f <input-file> [options]

CLI Flags

🔧 Command-line Flags

FlagDescription
-fInput file with URLs (required)
-fInput file with URLs (required)
-oOutput file to save results
-xDelimiters for splitting (e.g., `"=&"`) (default: `=`)
-pEnable splitting on path segments (`/`)
-aAppend a string to each URL variation
-FFile of strings to append (overrides `-a`)
-DRemove duplicate URLs
-QQuiet mode (suppress output)
-QQuiet mode (suppress output, show only final messages)
-hDisplay help message

Example Use Case

🧪 Example Use Case

# Splits URLs by =, &, / # Appends payloads from payloads.txt # Deduplicates results # Writes final output to out.txt urlshort -f urls.txt -o out.txt -x "=&" -p -F payloads.txt -D

📤 Sample Output

Given an input like https://example.com/page?user=admin and a payload, the output will include:

https://example.com/
https://example.com/page?
https://example.com/page?user=
https://example.com/page?user=admin<script>alert(1)</script>
... and many more variations