praetorianlabs Profile Banner
Praetorian Profile
Praetorian

@praetorianlabs

Followers
8K
Following
11K
Media
429
Statuses
2K

Praetorian provides a suite of #security solutions that enable clients to solve #cybersecurity problems across their #enterprise and product portfolios.

USA
Joined December 2010
Don't wanna be here? Send us removal request.
@praetorianlabs
Praetorian
10 hours
Zero-days make headlines, but your biggest risk might be in your logs. We’ve found API keys and credentials hiding in tools like Datadog and Kibana, a quiet goldmine for attackers (and red teams). Read the blog:
Tweet media one
0
2
2
@praetorianlabs
Praetorian
8 days
The annual penetration test was designed for a world that no longer exists; a time when attackers were hobbyists and AI was science fiction. Threats evolve. Security should too. Learn more about Chariot continuous offensive security -
0
0
1
@praetorianlabs
Praetorian
9 days
While security teams focused on Azure device code attacks, this GitHub variant has been flying under the radar, exploiting trusted authentication processes that developers use every day. See the full attack chain in this 30-min on-demand session.
0
1
1
@praetorianlabs
Praetorian
20 days
RT @rad9800: When we got access to Git[Hub,Lab] on Red Teams - it was almost always $$$. So it's pretty awesome to see a couple folk and f….
0
7
0
@praetorianlabs
Praetorian
27 days
We've spent years researching and building tools for CICD security. Now, we're ready to knowledge dump at a 2-day hands-on training at Black Hat (Aug 2-3, 4-5):. Learn more:
Tweet card summary image
praetorian.com
Learn to attack and defend CI/CD pipelines with hands-on training from Praetorian's Red Team at Black Hat 2025. Covering GitHub Actions, GitLab, Jenkins vulnerabilities, supply chain attacks, and...
0
2
4
@praetorianlabs
Praetorian
30 days
🚨 GitPhish is now open source. Our GitHub Device Code Phishing automation tool is live:. πŸ•’ Dynamic device code generation .πŸš€ Auto GitHub Pages deployment.πŸ’» CLI + web dashboard .🎯 Multi-target capability. Learn more via our latest blog:
Tweet card summary image
praetorian.com
Introducing GitPhish: An open-source tool for automating GitHub Device Code phishing attacks with dynamic code generation and professional landing pages for red teams.
0
1
2
@praetorianlabs
Praetorian
1 month
RT @harmj0y: One of the fun things we did for the Nemesis 2.0 release was heavily optimizing our usage of @praetorianlabs' Nosey Parker.….
0
4
0
@praetorianlabs
Praetorian
1 month
The @lockstepvc team are bringing back their annual #BlackHat party in Vegas on Weds, Aug 6th! Food, drinks, DJ, and good people - including our CEO, Nathan Sportsman! . Space is limited - register now to πŸ”’ in your spot: #BlackHat2025 #BHUSA
Tweet media one
0
0
3
@praetorianlabs
Praetorian
2 months
🚨 New attack disclosed: GitHub Device Code Phishing. John, Matt, and Mason reveal how they've been using this technique to compromise F500 orgs with high success rates. πŸ“– Blog covers methodology, red team case studies & detection strategies .
Tweet card summary image
praetorian.com
GitHub Device Code phishing: A new attack vector targeting developers. Learn how attackers abuse OAuth flows to compromise organizations and steal source code.
1
63
155
@praetorianlabs
Praetorian
2 months
Penetration testing is a lot like brushing your teeth. Annually is . not enough. This is why we developed Chariot.
0
0
0
@praetorianlabs
Praetorian
2 months
Security teams don’t need more tools. They need clarity. Chariot proves what’s real and exploitable 🐴
0
0
2
@praetorianlabs
Praetorian
2 months
Last week's @thotcon crowds were all smiles. Thanks to everyone who came out for any or all of our three sessions. See you next year πŸ˜„
Tweet media one
Tweet media two
0
0
0
@praetorianlabs
Praetorian
2 months
You wouldn't download a vape. but if you're a Prae engineer in front of a @HackSpaceCon then you might reverse engineer one in a bar πŸ€”. Our latest blog breaks down the entire journey - from initial teardown to discovering the surprising architecture inside consumer vaping.
0
3
6
@praetorianlabs
Praetorian
2 months
RT @4JMAN: had a wonderful time at @HackSpaceCon a few weeks ago :)
Tweet media one
Tweet media two
Tweet media three
0
1
0
@praetorianlabs
Praetorian
2 months
.@thotcon , we're comin' for ya!!!. Attendees will get the chance to catch a (final) encore of our training, "Breaking the Bot: GenAI Web App Attack Surface & Exploitation.". We'll also be debuting a never-before-seen lateral movement technique for domain-joined Linux machines.
Tweet media one
Tweet media two
0
0
1
@praetorianlabs
Praetorian
2 months
Our @HackSpaceCon takeover was a success πŸš€πŸš€πŸš€πŸš€πŸš€πŸš€. Big thanks to all of our workshop participants and presentation attendees!. Be sure to follow our in-person events calendar to find opportunities to connect with us in the future:
Tweet media one
Tweet media two
0
1
2
@praetorianlabs
Praetorian
3 months
Praetorian research found RCE & code smuggling vulns in Node.js CI/CD (GitHub/Jenkins). If it happened there, are your pipelines secure? Kudos Node.js for the swift fix!. Full details: #AppSec #RSAC #RSAC2025.
praetorian.com
Two CI/CD vulnerabilities in the nodejs/node GitHub repository exposed Node.js to remote code execution on Jenkins agents and the potential to merge unreviewed code to the main branch of the reposi...
0
4
9
@praetorianlabs
Praetorian
3 months
That DICOM vulnerability allowing code in medical images? It's not just Windows. Our ELFDICOM PoC extends the threat to Linux systems in healthcare via polyglot (ELF+DICOM) malware. Novel attack path analysis:
Tweet card summary image
praetorian.com
Learn about ELFDICOM, a Linux malware hidden in DICOM medical images. Learn how Praetorian's polyglot exploit threatens healthcare security via CVE-2019-11687.
0
3
6
@praetorianlabs
Praetorian
4 months
⭐️ Strong showing at @FIRSTdotOrg's #VulnCon for Praetorian's Director of OffSec L&D session - Breaking the Bot: GenAI Web App Attack Surface & Exploitation. Don't fret, you can catch Ken IRL at plenty of events in the not-so-distant future. Check it :
Tweet media one
0
1
1