This is poc of CVE-2022-46169 authentication bypass and remote code execution
☆15May 18, 2023Updated 2 years ago
Alternatives and similar repositories for cacti-cve-2022-46169-exploit
Users that are interested in cacti-cve-2022-46169-exploit are comparing it to the libraries listed below
Sorting:
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22☆29May 5, 2023Updated 2 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- ☆48Dec 28, 2025Updated 2 months ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- C# implementation of harmj0y's PowerView☆47Mar 22, 2020Updated 5 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year
- A Rust version of Mirage, a PoC memory evasion technique that relies on a vulnerable VBS enclave to hide shellcode within VTL1.☆38Mar 6, 2025Updated last year
- Rust crate for obfuscating string literals.☆13Feb 2, 2023Updated 3 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆37Updated this week
- Cobalt Strike BOF for beacon/shellcode injection using fork & run technique with Draugr synthetic stack frames☆154Nov 23, 2025Updated 3 months ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- ☆12Jun 4, 2025Updated 9 months ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated 3 weeks ago
- ☆16Apr 10, 2024Updated last year
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Ultra fast hashcracking tool written in Python3☆12Mar 28, 2021Updated 4 years ago
- Entity component system geared for games☆17Jun 21, 2019Updated 6 years ago
- Payload Generation Framework☆21Oct 24, 2024Updated last year
- The purpose of this repository is to provide a collaboration space for working on Petya/NoPetya tools specific to ICS☆18Jun 30, 2017Updated 8 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 5 months ago
- Dataset of reverse engineering tasks done using LLMs.☆68Apr 14, 2025Updated 11 months ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 5 years ago
- Repository for doing pen300 exercises☆23Oct 21, 2022Updated 3 years ago
- ☆10Updated this week
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- Audio steganography web app☆18Mar 16, 2020Updated 6 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- Trillium's - Master the art Of Necessary cybersecurity skills (T-MON)☆14Mar 27, 2024Updated last year
- Cracks Android Screenlock Gesture Pattern using dictionary Attack☆21Jan 5, 2016Updated 10 years ago
- Regexplore is a Volatility plugin designed to mimic the functionality of the Registry Explorer plugins in EZsuite☆18Mar 31, 2023Updated 2 years ago
- 一款强大的内网信息收集工具,支持文件、文件夹、文件内容、命令、注册表、进程、mimikatz命令、dpapi、最近访问收集,且支持定制化配置,只需更新配置文件,定义收集规则,即可开启对各类浏览器、remote工具、聊天软件进行凭据、信息收集☆22Oct 16, 2022Updated 3 years ago
- CLI and Go package for fast, offline ASN lookups☆21Feb 27, 2025Updated last year
- Collection of red team techniques.☆69Apr 25, 2025Updated 10 months ago