
Praetorian
@praetorianlabs
Followers
8K
Following
11K
Media
429
Statuses
2K
Praetorian provides a suite of #security solutions that enable clients to solve #cybersecurity problems across their #enterprise and product portfolios.
USA
Joined December 2010
RT @rad9800: When we got access to Git[Hub,Lab] on Red Teams - it was almost always $$$. So it's pretty awesome to see a couple folk and fβ¦.
0
7
0
We've spent years researching and building tools for CICD security. Now, we're ready to knowledge dump at a 2-day hands-on training at Black Hat (Aug 2-3, 4-5):. Learn more:
praetorian.com
Learn to attack and defend CI/CD pipelines with hands-on training from Praetorian's Red Team at Black Hat 2025. Covering GitHub Actions, GitLab, Jenkins vulnerabilities, supply chain attacks, and...
0
2
4
π¨ GitPhish is now open source. Our GitHub Device Code Phishing automation tool is live:. π Dynamic device code generation .π Auto GitHub Pages deployment.π» CLI + web dashboard .π― Multi-target capability. Learn more via our latest blog:
praetorian.com
Introducing GitPhish: An open-source tool for automating GitHub Device Code phishing attacks with dynamic code generation and professional landing pages for red teams.
0
1
2
RT @harmj0y: One of the fun things we did for the Nemesis 2.0 release was heavily optimizing our usage of @praetorianlabs' Nosey Parker.β¦.
0
4
0
The @lockstepvc team are bringing back their annual #BlackHat party in Vegas on Weds, Aug 6th! Food, drinks, DJ, and good people - including our CEO, Nathan Sportsman! . Space is limited - register now to π in your spot: #BlackHat2025 #BHUSA
0
0
3
π¨ New attack disclosed: GitHub Device Code Phishing. John, Matt, and Mason reveal how they've been using this technique to compromise F500 orgs with high success rates. π Blog covers methodology, red team case studies & detection strategies .
praetorian.com
GitHub Device Code phishing: A new attack vector targeting developers. Learn how attackers abuse OAuth flows to compromise organizations and steal source code.
1
63
155
Last week's @thotcon crowds were all smiles. Thanks to everyone who came out for any or all of our three sessions. See you next year π
0
0
0
You wouldn't download a vape. but if you're a Prae engineer in front of a @HackSpaceCon then you might reverse engineer one in a bar π€. Our latest blog breaks down the entire journey - from initial teardown to discovering the surprising architecture inside consumer vaping.
0
3
6
.@thotcon , we're comin' for ya!!!. Attendees will get the chance to catch a (final) encore of our training, "Breaking the Bot: GenAI Web App Attack Surface & Exploitation.". We'll also be debuting a never-before-seen lateral movement technique for domain-joined Linux machines.
0
0
1
Our @HackSpaceCon takeover was a success ππππππ. Big thanks to all of our workshop participants and presentation attendees!. Be sure to follow our in-person events calendar to find opportunities to connect with us in the future:
0
1
2
Praetorian research found RCE & code smuggling vulns in Node.js CI/CD (GitHub/Jenkins). If it happened there, are your pipelines secure? Kudos Node.js for the swift fix!. Full details: #AppSec #RSAC #RSAC2025.
praetorian.com
Two CI/CD vulnerabilities in the nodejs/node GitHub repository exposed Node.js to remote code execution on Jenkins agents and the potential to merge unreviewed code to the main branch of the reposi...
0
4
9
That DICOM vulnerability allowing code in medical images? It's not just Windows. Our ELFDICOM PoC extends the threat to Linux systems in healthcare via polyglot (ELF+DICOM) malware. Novel attack path analysis:
praetorian.com
Learn about ELFDICOM, a Linux malware hidden in DICOM medical images. Learn how Praetorian's polyglot exploit threatens healthcare security via CVE-2019-11687.
0
3
6
RT @MiRCyberRecruit: Skills can be taught. Tools change. Principles? That's what holds @praetorianlabs together. Our culture is built on thβ¦.
praetorian.com
As the Director of Talent Acquisition, I often reflect on the true scope of our teamβs role. Yes, we find and attract exceptional individuals. But our responsibility extends far beyond the offer...
0
2
0
βοΈ Strong showing at @FIRSTdotOrg's #VulnCon for Praetorian's Director of OffSec L&D session - Breaking the Bot: GenAI Web App Attack Surface & Exploitation. Don't fret, you can catch Ken IRL at plenty of events in the not-so-distant future. Check it :
0
1
1