OXO is a security scanning orchestrator for the modern age.
☆564Mar 27, 2026Updated this week
Alternatives and similar repositories for oxo
Users that are interested in oxo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers☆97Updated this week
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆608Mar 12, 2026Updated 2 weeks ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,522Mar 21, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 7 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated last month
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆449Nov 2, 2023Updated 2 years ago
- An offensive data enrichment pipeline☆944Mar 19, 2026Updated last week
- Vajra is a UI-based tool with multiple techniques for attacking and enumerating in the target's Azure and AWS environment. It features an…☆408Feb 21, 2025Updated last year
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,312Mar 17, 2026Updated last week
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆247Mar 19, 2024Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,155Mar 13, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,371Mar 20, 2026Updated last week
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- Efficient DevSecOps☆47Jun 30, 2025Updated 8 months ago
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆704Oct 29, 2021Updated 4 years ago
- Pentesting automation platform that combines hacking tools to complete assessments☆524Mar 22, 2026Updated last week
- Fast and customizable vulnerability scanner For JIRA written in Python☆344Dec 31, 2024Updated last year
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆78Sep 1, 2025Updated 6 months ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated 3 weeks ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆129Dec 23, 2025Updated 3 months ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆709Oct 9, 2023Updated 2 years ago
- Standalone utility for service discovery on open ports!☆748Jan 13, 2026Updated 2 months ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆426Feb 20, 2026Updated last month
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,040Aug 23, 2025Updated 7 months ago
- A fast port scanner written in go with a focus on reliability and simplicity. Designed to be used in combination with other tools for att…☆5,837Updated this week
- Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token…☆161Dec 19, 2021Updated 4 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Network Security Sniffer☆844Jan 2, 2026Updated 2 months ago
- Pentest Report Generator☆2,784Mar 19, 2026Updated last week
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- Overlord - Red Teaming Infrastructure Automation☆630May 28, 2024Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆3,206May 1, 2025Updated 10 months ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆189Jan 30, 2023Updated 3 years ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,976Jul 12, 2024Updated last year