WSHawk Documentation

Current v4 reference material for stateful web and realtime application testing.

What v4 Optimizes For

Project-Backed Operations

Traffic, identities, notes, findings, and exports stay together in one local project.

Stateful Testing

Replay, AuthZ diff, and race testing matter more than a one-shot scanner when the target is stateful.

Evidence-First Review

Browser evidence, timeline data, validation labs, and exports exist to support operator review, not hype.

๐Ÿ”„

v4 Workflow Lifecycle

How projects, capture, replay, diffing, race testing, and exports fit together.

๐Ÿš€

Getting Started

Install WSHawk, choose the right surface, and start with the recommended v4 path.

๐Ÿง 

Protocol & Heuristics

How WSHawk infers message families, fields, protocol hints, and likely attack paths.

โš”๏ธ

Replay & Attack Services

Where payload mutation still helps and where replay, AuthZ diff, and race become the stronger proof path.

๐Ÿ“ก

OAST & Blind Testing

Using callback-based detection for SSRF, XXE, and similar out-of-band behavior.

๐Ÿงช

Browser Evidence

What the Playwright-assisted evidence path does and what it does not claim.

๐Ÿ“Š

Vulnerability Coverage

The main issue classes WSHawk is good at proving in v4.

๐Ÿ“š

Academy

Longer v4 guides for desktop workflows, architecture, evidence, validation, and release history.

Core Command Reference

CommandDescription
wshawk ws://target.example/wsRun the compatibility scanner for a fast first pass.
wshawk-interactiveOpen the interactive CLI workflow.
wshawk-advanced ws://target.example/wsUse the advanced legacy CLI path with more scanner-side controls.
wshawk-defensiveRun the narrow defensive helper checks that still ship with the project.
cd desktop && npm run smokeRun the lightweight desktop sanity check.