HAX is the AI-assisted offensive security reconnaissance platform XContent RED uses on real engagements — now available to your team. Continuous attack-surface discovery, dark-web intelligence, and AI-prioritised remediation in a single operator console.
HAX doesn't stop at scanning. It runs a continuous loop — discover what's exposed, contextualise the threat, and provides the fix. Built by operators, for operators.
Continuous attack-surface enumeration across DNS, certificates, ASN ranges, public code, leaked configs, and thousands of dark-web sources — not a one-shot scan.
Findings are identified by CVE, CVSS and an indication whether the exploit is active in the wild (CISA KEV). AI prioritisation surfaces the things that matter most.
Critical alerts directed to WhatsApp, SMS or webhook. Red Team Engineers and Customers can route findings to either XContent or your own support desk. HAX closes the loop — you can verify remediation once it's marked as done.
Every surface in HAX was designed by people who run real engagements. No marketing dashboards. No vanity charts. Just the views that move incidents to closed.
Every external asset your organisation accidentally publishes — across subsidiaries, M&A debt, shadow IT, and forgotten cloud accounts — discovered, fingerprinted, and tracked over time.
We watch the places your security team can't — initial access broker forums, ransomware leak blogs, credential dumps, Telegram channels — and surface only what matches your domains, executives, and code repositories.
Not another red-amber-green dashboard. HAX routes the right finding to the right engineer with reproduction steps, suggested patch, and verification logic — and pages on-call when the issue is hostile enough to warrant it.
Every HAX finding maps to controls in ISO 27001, NIST CSF, PCI DSS, and POPIA. Auditors get evidence. CISOs get coverage gaps. Engineering gets back to work.
Engineers get a technical artifact with reproduction and remediation steps. Boards get a narrative with risk-adjusted insights. Both written from the same evidence — no translation loss.
Finding #07 — Citrix NetScaler RCE
Most attack-surface tools stop at the perimeter. HAX was built by red teamers, so it goes where adversaries go — and watches the places they trade access.
If your environment is being shopped, HAX will alert you.
Stealer-log ingestion matched against your executive roster. We alert when a board member's credentials surface — usually within hours of the dump.
Public GitHub gists, paste sites, Discord dumps. HAX matches domain mentions against your organisation faster than anyone else.
Tell us your domain. We'll scope a no-obligation assessment and surface what's exposed — attack surface, dark-web exposure, and AI-prioritised remediation. If it's useful, we'll talk pricing.