๐Ÿ”’ Offline-First ยท Privacy-By-Design ยท Vanguard v1.2.0

Deterministic Static Analysis
for HTML Media Resources

Parse, trace, and evaluate complex webpage source code to identify embedded media endpoints โ€” without telemetry, external tracking, or brittle headless automation. Built for the independent digital forensic consultant.

The Vanguard v2.0 Interface

A living, forensic-grade analysis environment. Paste HTML, review scored candidates, export tamper-evident reports.

HyperSnatch Vanguard v2.0 โ€” Forensic HTML Endpoint Analysis Interface

Real interface. Offline-first. No cloud dependencies.

Built for Consultants.
Maintained by Engineering.

Solving a specific infrastructure problem: mapping underlying resource URLs from obfuscated HTML without leaking analysis data to a SaaS provider.

๐Ÿ›ก๏ธ

Offline-First Architecture

The engine processes HTML entirely on your local hardware. No phone-home analytics, no cloud dependencies, no silent metrics. Ideal for airgapped forensic labs.

๐Ÿงฎ

Deterministic AST Parsing

Mathematically parses the Abstract Syntax Tree of raw HTML. The same input always yields the exact same confidence-scored output. Verifiable via SHA-256.

๐Ÿ“‹

Tamper-Evident Evidence Logs

Immutable operation logging with timestamps, user attribution, and forensic-grade audit trails. Every action is recorded and exportable.

๐Ÿ”

Cash Policy Shield

Automatically detects and logs authorization boundaries (e.g., Age Gates, Premium Paywalls, Logins) as legal refusals, preserving your operational standing.

๐Ÿ“ฆ

Sovereign Audit Chain

Export results as CSV, JSON, or structured HTML/PDF. Every report is cryptographically signed with a hardware-bound session key using HMAC-SHA256.

๐Ÿ–ฅ๏ธ

Hardened Desktop App

Context isolation, disabled Node integration, sandboxed rendering. Includes an Enterprise Safe-Mode UI toggle for high-stress field operations.

๐Ÿฆ€

Rust Forensic Core (hs-core)

A native, memory-safe Rust binary operating outside the V8 heap. Safely processes massive 100MB+ minified HTML or HAR logs without crashing.

๐Ÿ“‚

AES-256 Evidence Vaults

Exported case artifacts are fully encrypted at rest using AES-256-GCM, tied directly to your specific hardware node fingerprint.

โŒจ๏ธ

Headless CLI Integration

A polished Node wrapper (`hypersnatch-cli`) for the Rust core, allowing seamless integration into SOC/SOAR automated pipelines.

Same Input. Same Output. Every Time.

Verify HyperSnatch's deterministic behavior yourself. Run the sample payload and check the SHA-256 hash against our published proof.

๐Ÿงช Verification Steps

1

Download sample-payload.html from the demo/ directory on GitHub.

2

Load the file into HyperSnatch (drag-and-drop or File โ†’ Open).

3

Export the analysis manifest as JSON and compute its SHA-256 hash.

4

Compare your hash against the published expected output below.

# Expected SHA-256 of manifest output for sample-payload.html
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

# Verify on Windows PowerShell:
Get-FileHash -Algorithm SHA256 .\manifest_output.json | Select-Object Hash

# Verify on macOS/Linux:
sha256sum manifest_output.json

Transparent Pricing Tiers

From free community access to zero-friction enterprise deployments. No telemetry. No hidden recurring fees.

Community
$0
Free Forever ยท Limited Exports
  • Unlimited HTML/HAR AST parsing
  • Access to 40+ deterministic decoders
  • Mathematical Determinism Engine
  • Standard JSON manifest export
  • Basic error logging
Download Free Core
Institutional
$499
One-time volume license ยท Direct engineering access
  • Everything in Sovereign
  • Headless CLI Access (`hypersnatch-cli`)
  • SOC / SOAR pipeline automation
  • Volume site license (Up to 5 analysts)
  • Dedicated private Discord support channel
  • Archival static binary formats
Secure Institutional License

FAQ

Unlike dynamic automation that executes arbitrary scripts, HyperSnatch mathematically parses the Abstract Syntax Tree (AST) of raw HTML. The same input source always yields the exact same confidence-scored output. This is verifiable via SHA-256 hash comparison.

Absolutely not. HyperSnatch operates entirely on publicly accessible, static input data. It is an analysis utility, not a circumvention tool, and cannot decode encrypted DRM streams. The Cash Policy Shield proactively logs access boundaries as refusals.

The analysis engine processes HTML locally โ€” completely offline. The application requires a brief internet connection solely for cryptographic license verification on first launch. All analysis operations remain entirely off-grid.

Security researchers, digital forensics investigators, compliance auditors, and technical journalists who need to analyze digital artifacts offline with verifiable, tamper-evident audit trails โ€” without relying on expensive enterprise tools or cloud SaaS providers.

HyperSnatch analyzes HTML files and HAR (HTTP Archive) logs. Results can be exported as CSV, JSON, plain text, or formatted PDF. Manifest files include SHA-256 hashes and HMAC signatures for data provenance verification.

A one-time $149 payment secures unlimited artifact processing, all export formats, email support with 12-hour response times, and every v1.x feature update. No subscription, no recurring charges, no telemetry. Backed by a 14-day deterministic guarantee.