Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
☆1,941Oct 7, 2023Updated 2 years ago
Alternatives and similar repositories for Awesome-RCE-techniques
Users that are interested in Awesome-RCE-techniques are comparing it to the libraries listed below
Sorting:
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆534Dec 4, 2024Updated last year
- Rockyou for web fuzzing☆3,023Feb 11, 2026Updated 2 weeks ago
- bypass-url-parser☆1,113Feb 21, 2026Updated last week
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,230Aug 18, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,367Oct 27, 2023Updated 2 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,182Jan 5, 2026Updated last month
- A C2 post-exploitation framework☆482Jan 24, 2024Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,259Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,961Jul 12, 2024Updated last year
- A python script to scan for Apache Tomcat server vulnerabilities.☆887Jan 12, 2026Updated last month
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,415Dec 20, 2025Updated 2 months ago
- Tools & Interesting Things for RedTeam Ops☆2,256Feb 10, 2026Updated 2 weeks ago
- Hidden parameters discovery suite☆2,027Sep 8, 2024Updated last year
- Gather and update all available and newest CVEs with their PoC.☆7,551Feb 22, 2026Updated last week
- Real-world infosec wordlists, updated regularly☆1,640Updated this week
- All about bug bounty (bypasses, payloads, and etc)☆6,655Sep 8, 2023Updated 2 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,149May 13, 2023Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Oct 29, 2025Updated 4 months ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,077Jul 29, 2024Updated last year
- Red Team Cheatsheet in constant expansion.☆1,263Dec 28, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,034Jun 25, 2025Updated 8 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,827Feb 19, 2026Updated last week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- declutters url lists for crawling/pentesting☆1,526Feb 23, 2025Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,155Feb 21, 2026Updated last week
- ☆1,200Sep 2, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,643Aug 28, 2025Updated 6 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,259Dec 9, 2025Updated 2 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,524Jan 15, 2026Updated last month
- Arsenal is just a quick inventory and launcher for hacking programs☆3,687Nov 29, 2024Updated last year
- Azure Security Resources and Notes☆1,711Feb 17, 2026Updated last week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,548Updated this week
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violati…☆395Feb 18, 2026Updated last week
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,251Apr 12, 2024Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆11,983Updated this week
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,610Nov 14, 2025Updated 3 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆975Jan 12, 2024Updated 2 years ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,644Nov 23, 2025Updated 3 months ago