This is poc of CVE-2022-46169 authentication bypass and remote code execution
☆15May 18, 2023Updated 2 years ago
Alternatives and similar repositories for cacti-cve-2022-46169-exploit
Users that are interested in cacti-cve-2022-46169-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- A Collection of 88x31px GIFs☆14Jun 21, 2024Updated last year
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆47Dec 28, 2025Updated 3 months ago
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- C# implementation of harmj0y's PowerView☆47Mar 22, 2020Updated 6 years ago
- ☆17Jan 4, 2023Updated 3 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- A simple index for HackTheBox machine along with tags☆16Mar 26, 2026Updated 2 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Rust crate for obfuscating string literals.☆13Feb 2, 2023Updated 3 years ago
- Source files and writeups for the brixel CTF 2020☆10Jan 1, 2021Updated 5 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆39Updated this week
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 5 months ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆154Nov 23, 2025Updated 4 months ago
- ☆11Jun 4, 2025Updated 10 months ago
- Python default webserver as an windows executable☆18Jan 20, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated last month
- This is a script that scans an IP address or URL for SQL Injection vulnerabilities. If any are found, it includes an extensive library of…☆16Jul 22, 2024Updated last year
- ☆17Apr 10, 2024Updated last year
- Simple AWS ELB log parser which parses Classic LB and ALB logs into JSONs☆18May 2, 2025Updated 11 months ago
- HTB official Discord bot☆60Updated this week
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 6 months ago
- Payload Generation Framework☆22Oct 24, 2024Updated last year
- Dataset of reverse engineering tasks done using LLMs.☆68Apr 14, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- Repository for doing pen300 exercises☆25Oct 21, 2022Updated 3 years ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated last year
- Código del tutorial: Librería para animar elementos al scrollear en 5 minutos☆13Dec 4, 2021Updated 4 years ago
- 🔑⌨ Windows keylogger made in python ;D☆19Jan 2, 2020Updated 6 years ago
- Privacy-enabling tools for onchain Provable querying☆15Apr 26, 2019Updated 6 years ago
- PDFExaminer Tool - Analyse PDF Malware☆64Aug 12, 2021Updated 4 years ago