Have you ever used a really cool open-source OSINT tool, only to find that as the maintainers added more features, the UI became a complete, unreadable mess?
I call this the "Masonry Grid Nightmare." Dumping dozens of intelligence data points onto a single scrolling screen simply doesn't scale.
I got tired of slow tools and cluttered dashboards. So, I built my own.
Meet URL Hawk Scanner 🦅: A blazing-fast, concurrent vulnerability and recon scanner built in Go.
🎨 The Solution: A Next-Gen Glassmorphism HUD
To solve the UI clutter problem, I completely redesigned how OSINT data is displayed using a Split-Pane Glassmorphism HUD (Heads Up Display).
Left Sidebar: A sleek, scrollable glass list of all executed modules (DNS Records, Security Headers, Open Ports, etc.). Next to each tab is a pulsing status dot (🟢 Secure, 🟡 Warning, 🔴 Critical).
Right Viewer: A large, elegant glass viewing pane. When you click a module on the left, its rich data beautifully fades into the right pane.
The result? You can add 100 new plugins over the next year and the UI footprint never changes. It always feels like a clean, high-end cybersecurity terminal rather than a crowded grid.
⚡ Built for Speed & Extensibility
Under the hood, URL Hawk Scanner is powered by Go's concurrency model (Goroutines). It's designed with an isolated, pluggable architecture. It hits 10+ different network endpoints simultaneously without breaking a sweat.
Right out of the box, it checks for:
✅ DNS Records, WHOIS, & Open Ports
✅ Security Headers & Exposed Sensitive Files
✅ SSL Certificate Details & IP Geolocation
✅ Technology Stack, Wayback Archives, & More...
🤝 Let's Build Together!
I built this tool to be fast, beautiful, and highly extensible. If you want a fast OSINT scanner, or are looking for a fun open-source Go project to contribute to, check out the repo!
⭐ Drop a star on the repo and try it out:
https://github.com/DhanushNehru/urlhawkscanner
Let me know what you think in the comments! What OSINT feature should be added here?
Top comments (0)