Skip to content
Built by XContent RED

Know your attack surface before attackers do.

HAX is the AI-powered security reconnaissance platform that unifies attack surface discovery, vulnerability scanning, dark web intelligence, and remediation reporting — built by XContent RED.

How Hax works

Recon. Analyse. Act.

One platform. Three phases. Built around a single idea: your team should spend time fixing what matters, not triaging false positives.

  1. 01

    Recon

    Continuously discover what you actually expose to the internet — domains, subdomains, services, certificates, leaked credentials. No agents required.

    • Attack surface mapping
    • CVE & vulnerability scanning
    • Dark web & stealer log monitoring
  2. 02

    Analyse

    AI-prioritised findings — not 10,000 raw alerts. Hax explains what each issue means, why it matters, and which ones an attacker will reach for first.

    • Risk-ranked findings
    • Compliance mapping (POPIA, GDPR, ISO, NIST)
    • Executive vs technical narratives
  3. 03

    Act

    Real-time alerts when posture changes. Reports your CISO can present to the board. Integrations into your ticketing and on-call workflows.

    • Real-time WhatsApp/Slack/email alerts
    • PDF & on-screen executive reports
    • API + webhook integrations
Capabilities

Built for the full reconnaissance loop.

Attack surface realisation

See every internet-facing asset — domains, subdomains, IPs, ports, services — that an attacker would discover in their reconnaissance phase.

Real-time exposure alerts

When something changes — new exposed service, expired certificate, fresh credential leak — your team knows in minutes, not weeks.

Compliance mapping

Findings auto-mapped to POPIA, GDPR, ISO 27001, NIST CSF — bridging the gap between technical reality and audit narrative.

Total clarity reporting

Executive PDF reports written for the boardroom alongside technical detail for engineers — generated from the same scan.

Hax dark web monitoring dashboard showing VIP credential leaks
The differentiator

Where attackers already are.

Most "dark web monitoring" tools surface old paste sites and call it a day. Hax taps into the same intelligence sources adversaries use — including stealer log marketplaces — and tells you which credentials, sessions, or device fingerprints belonging to your organisation are actively for sale.

  • Stealer log forensics

    Per-device, per-credential leak intelligence sourced from active marketplaces.

  • VIP & executive watch

    Continuous monitoring of high-value targets — boards, founders, C-suite.

  • Real-time alerting

    Minutes from leak to alert via WhatsApp, Slack, or email.

See dark web capabilities
"Hax replaced three separate tools and a recurring consulting bill. The first scan surfaced exposures we'd missed for years."
CISO, Mid-market Financial Services Engagement reference available on request

See your own attack surface.

A 30-minute live demo against your domain. Walk away with a sample report whether or not you continue.