PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22
☆29May 5, 2023Updated 3 years ago
Alternatives and similar repositories for CVE-2022-46169
Users that are interested in CVE-2022-46169 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Demo of a malicious python package that will run code upon pip download or install☆29Sep 10, 2022Updated 3 years ago
- CVE-2022-25765 pdfkit <0.8.6 command injection.☆15Dec 21, 2022Updated 3 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- FSOP Again☆36Apr 3, 2022Updated 4 years ago
- CVE-2023-2255 Libre Office☆64Jul 10, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Metabase Pre-auth RCE (CVE-2023-38646)!!☆15Jul 29, 2023Updated 2 years ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- Fuzzapi is a tool used for REST API pentesting and uses Fuzzapi gem☆15May 30, 2022Updated 3 years ago
- A utility for automating the testing and re-signing of Express.js cookie secrets.☆59Dec 10, 2022Updated 3 years ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆28May 8, 2023Updated 3 years ago
- CVE-2022-46169 Cacti remote_agent.php Unauthenticated Command Injection.☆47Dec 8, 2022Updated 3 years ago
- PoC☆12Apr 7, 2025Updated last year
- 后台插件getshell☆50Dec 4, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- A webshell plugin and interactive shell for pentesting a Joomla website.☆60May 23, 2022Updated 3 years ago
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Nov 6, 2023Updated 2 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 3 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures☆43May 9, 2017Updated 9 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Mar 18, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- GameOver(lay) Ubuntu Privilege Escalation☆134Oct 9, 2023Updated 2 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆12Dec 10, 2024Updated last year
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Find orphaned IP's on cloud services☆29Oct 23, 2019Updated 6 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Motorola 68k architecture support for binary ninja☆12Jun 7, 2022Updated 3 years ago
- Exploits targeting Symfony☆215Sep 19, 2024Updated last year
- PowerShell Reverse Shell☆80May 7, 2023Updated 3 years ago
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- ☆13Apr 14, 2024Updated 2 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated 2 months ago