https://github.com/copyleftdev/pricklypwn
An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.
https://github.com/copyleftdev/pricklypwn
cacti command-injection cve-2022-46169 cybersecurity ethical-hacking exploitation-tool payload penetration-testing rce remote-command-execution reverse-shell security vulnerability-assessment
Last synced: 3 months ago
JSON representation
An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.
- Host: GitHub
- URL: https://github.com/copyleftdev/pricklypwn
- Owner: copyleftdev
- Created: 2023-09-10T17:00:50.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-09-10T17:14:08.000Z (over 1 year ago)
- Last Synced: 2024-06-19T17:56:15.308Z (11 months ago)
- Topics: cacti, command-injection, cve-2022-46169, cybersecurity, ethical-hacking, exploitation-tool, payload, penetration-testing, rce, remote-command-execution, reverse-shell, security, vulnerability-assessment
- Language: Go
- Homepage:
- Size: 2.93 KB
- Stars: 1
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: readme.md
Awesome Lists containing this project
README
Sure! Here's a "dope" README.md for your `PricklyPwn` project:
---
# 🌵 PricklyPwn 🌵

*Penetrate with precision. A Remote Command Execution Exploit for Cacti v1.2.22.*
---
## Table of Contents
1. [Description](#description)
2. [Installation](#installation)
3. [Usage](#usage)
4. [Ethical Notice](#ethical-notice)---
## Description
**PricklyPwn** is a sleek, high-performance tool crafted in Go, designed to exploit the Remote Command Execution (RCE) vulnerability found in Cacti versions up to v1.2.22. Built for security enthusiasts, ethical hackers, and defenders, it assists in comprehending and remediating the CVE-2022-46169 vulnerability.
---
## Installation
```bash
# Clone this repository
git clone https://github.com/your_username/PricklyPwn.git# Navigate to the PricklyPwn directory
cd PricklyPwn# Build the Go binary
go build -o PricklyPwn main.go
```---
## Usage
```bash
# Basic usage
./PricklyPwn -url -remote_ip -remote_port
```For more advanced options, refer to the documentation.
---
## 🚨 Ethical Notice 🚨
This tool is strictly intended for educational and legal, authorized penetration testing purposes. Always get explicit permission before attempting any kind of testing. Unauthorized hacking is illegal and unethical. The `PricklyPwn` team cannot and will not bear responsibility for misuse.
---
## Acknowledgments
- Thanks to all security researchers who continuously push the boundaries and inspire tools like this.
- Special shoutout to the Cacti team for their commitment to making the internet a safer place.