This is poc of CVE-2022-46169 authentication bypass and remote code execution
☆15May 18, 2023Updated 2 years ago
Alternatives and similar repositories for cacti-cve-2022-46169-exploit
Users that are interested in cacti-cve-2022-46169-exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- cve-2023-21768☆27Mar 10, 2023Updated 3 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆48Dec 28, 2025Updated 4 months ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Exfiltrate all saved Wi-Fi passwords from a Windows PC☆13Sep 14, 2023Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 6 years ago
- C# implementation of harmj0y's PowerView☆49Mar 22, 2020Updated 6 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- A simple index for HackTheBox machine along with tags☆16Mar 26, 2026Updated last month
- Rust crate for obfuscating string literals.☆13Feb 2, 2023Updated 3 years ago
- Source files and writeups for the brixel CTF 2020☆10Jan 1, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆38Updated this week
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆86Oct 20, 2025Updated 6 months ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 7 months ago
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆156Nov 23, 2025Updated 5 months ago
- ☆12Jun 4, 2025Updated 10 months ago
- Python default webserver as an windows executable☆18Jan 20, 2018Updated 8 years ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated 2 months ago
- ☆17Apr 10, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Ultra fast hashcracking tool written in Python3☆12Mar 28, 2021Updated 5 years ago
- Simple AWS ELB log parser which parses Classic LB and ALB logs into JSONs☆18May 2, 2025Updated 11 months ago
- Entity component system geared for games☆17Jun 21, 2019Updated 6 years ago
- HTB official Discord bot☆61Apr 15, 2026Updated 2 weeks ago
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 7 months ago
- ☆35Oct 9, 2025Updated 6 months ago
- Payload Generation Framework☆22Oct 24, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Dataset of reverse engineering tasks done using LLMs.☆71Apr 14, 2025Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆65Apr 2, 2025Updated last year
- Repository for doing pen300 exercises☆25Oct 21, 2022Updated 3 years ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated 11 months ago
- Privacy-enabling tools for onchain Provable querying☆15Apr 26, 2019Updated 7 years ago
- ☆10Apr 5, 2026Updated 3 weeks ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago