Name: Praetorian
Type: Organization
Bio: Praetorian provides a suite of security solutions that enable clients to solve cybersecurity problems across their enterprise and product portfolios.
Twitter: praetorianlabs
Location: US (Austin, TX)
Blog: https://www.praetorian.com
Praetorian's Projects
Repository for information about 0-days exploited in-the-wild.
Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS
Application Security Verification Standard
Use Terraform to scaffold a reference AWS architecture for IoT usage
A Rails application containing multiple vulnerabilities used for demonstration purposes
Burp extension for decoding WCF-gzipped requests.
Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.
Collection of Praetorian solutions to CTF challenges
DNS Enumeration and Reconnaissance Tool
The Damn Vulnerable Router Firmware Project
Enumerate the permissions associated with AWS credential set
radare, angr, pwndbg, binjitsu, ect in a box ready for pwning
Standalone utility for service discovery on open ports!
GitHub Actions Pipeline Enumeration and Attack Tool
Scripts to demonstrate VPC Service Controls between tenant and shared projects
Automated Responder/secretsdump.py cracking
A static analysis tool for securing Go code
A graph conversion tool for https://cloud.google.com/
An implementation of GraphQL for Go / Golang
An implementation of the hashcat rules engine in javascript
Text file to BMP image with box drawing and blurring from the command line
Password cracking rules for Hashcat based on statistics and industry patterns
Impacket is a collection of Python classes for working with network protocols.
A Proof of Concept Rootkit Demonstrating Keylogging and Virtual File System (VFS) Capabilities
Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.
Log4j detector and reporting server for scalable detection of vulnerable running processes.