Awesome list of step by step techniques to achieve Remote Code Execution on various apps!
☆1,945Oct 7, 2023Updated 2 years ago
Alternatives and similar repositories for Awesome-RCE-techniques
Users that are interested in Awesome-RCE-techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆535Dec 4, 2024Updated last year
- A C2 post-exploitation framework☆487Jan 24, 2024Updated 2 years ago
- bypass-url-parser☆1,124Apr 18, 2026Updated last week
- A python script to scan for Apache Tomcat server vulnerabilities.☆894Jan 12, 2026Updated 3 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,229Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Rockyou for web fuzzing☆3,133Mar 11, 2026Updated last month
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,233Aug 18, 2023Updated 2 years ago
- Hidden parameters discovery suite☆2,050Sep 8, 2024Updated last year
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,998Jul 12, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,383Oct 27, 2023Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,498Apr 12, 2026Updated 2 weeks ago
- Gather and update all available and newest CVEs with their PoC.☆7,705Updated this week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,481Apr 23, 2026Updated last week
- Tools & Interesting Things for RedTeam Ops☆2,271Feb 10, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,171May 13, 2023Updated 2 years ago
- All about bug bounty (bypasses, payloads, and etc)☆6,716Sep 8, 2023Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,742Updated this week
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,110Jul 29, 2024Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆7,104Jun 25, 2025Updated 10 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,905Updated this week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,910Oct 29, 2025Updated 6 months ago
- Red Team Cheatsheet in constant expansion.☆1,278Dec 28, 2023Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,596Jan 18, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- declutters url lists for crawling/pentesting☆1,551Feb 23, 2025Updated last year
- ☆1,202Sep 2, 2022Updated 3 years ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆598Jan 31, 2025Updated last year
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violati…☆400Mar 6, 2026Updated last month
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,543Mar 8, 2026Updated last month
- Arsenal is just a quick inventory and launcher for hacking programs☆3,717Nov 29, 2024Updated last year
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆967Dec 31, 2021Updated 4 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,999Sep 5, 2021Updated 4 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,172Mar 8, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automation for internal Windows Penetrationtest / AD-Security☆3,657Aug 28, 2025Updated 8 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,435Mar 5, 2024Updated 2 years ago
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,673Apr 20, 2026Updated last week
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,773Nov 23, 2025Updated 5 months ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,590Apr 12, 2026Updated 2 weeks ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,833Jun 9, 2024Updated last year
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,277Apr 23, 2026Updated last week