This guide is for the current v4 repo layout.
If you only remember one thing: the CLI is still available, but the strongest v4 workflow is the desktop app plus a local validation target or a real authorized target.
pip install wshawkIf you want browser-assisted XSS evidence collection or DOM-related flows:
playwright install chromiumgit clone https://github.com/regaan/wshawk
cd wshawk
pip install -e .Use this when you already have a WebSocket endpoint and want a fast first pass.
wshawk wss://target.example/wsUse this when the target is stateful, authenticated, or browser-driven.
cd desktop
npm install
npm startUse this when you want a realistic local target that matches current v4 workflows.
./venv/bin/python -m uvicorn validation.full_stack_realtime_saas.app:app --host 127.0.0.1 --port 8010Then:
- start the desktop app
- create a new project
- browse to
http://127.0.0.1:8010 - pair the browser companion if you want handshake capture
- replay HTTP and WebSocket actions from the same project
The most realistic first run is the local full-stack validation lab.
./venv/bin/python -m uvicorn validation.full_stack_realtime_saas.app:app --host 127.0.0.1 --port 8010cd desktop
npm start- create a new WSHawk project
- open the validation app in your browser
- capture the handshake with the browser companion if needed
- store identities such as
alice,mallory,bob, andbrenda - use HTTP Forge or Request Forge to replay actions
- run
AuthZ Diff - run
Race - review Evidence Vault
- export the project bundle
This path matches the current v4 architecture far better than pointing a scanner at a dead public echo service.
The scanner path can generate:
- HTML reports
- JSON reports
- CSV reports
- SARIF reports
By default, reports go under ./reports unless you change reporting.output_dir in config.
The desktop project workflow can export project bundles as:
- JSON
- Markdown
- HTML
These exports are tied to the local project and include replay- and evidence-oriented context.
Read WSHawk v4 Complete Guide.
Read Desktop v4 Full Feature Guide.
Read Advanced Usage.
Read Validation Checklist.
Read Vulnerability Details.
Read Session Security Tests.