Labs
We build innovative, sustainable solutions that solve real-world problems for our customers and ourselves.
We build innovative, sustainable solutions that solve real-world problems for our customers and ourselves.
Labs is a small team at Praetorian doing big things. Our mission is to reliably build innovative and sustainable solutions that meaningfully solve real-world problems for ourselves and our customers. We're a small team making major impacts on the company and the industry. Our projects vary greatly, from developing new product and service capabilities to meet emerging customer needs to providing subject matter expertise and advise and assist operations to our product, engineering, and services teams.
Labs is at the core of Praetorian's next wave of innovation, and our relentless pursuit to solve the cybersecurity problem.
From product support to building out radical new technologies, we approach projects that align with our company strategy, with the speed and ambition of a startup.
Do you have a challenging problem you think might be right for Praetorian Labs? Contact Us
An open source, next generation SAST tool for GoLang
View on GithubCurrently in alpha: Chariot by Praetorian is a truly next generation application security orchestration and automation platform.
Learn more about ChariotPython and Powershell internal penetration testing framework
View on GithubA transparent proxy that can modify and drop traffic for arbitrary TCP connections
View on GithubPyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible
View on GithubAn automated password spraying tool
View on GithubWhat catches our attention? Game changing ideas and advancements with the potential for a 10X impact on the world’s most challenging problems.
Not for the faint at heart, but this book offers thorough, scholarly coverage of an area that is growing in importance in cybersecurityChristian Collberg's take on Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection: Obfuscation, Watermarking, and Tamperproofing for Software Protection
Yogi Berra was (among other things) an incredible quote machine, and he’s often credited with the following gem: “It’s tough to make predictions, especially about the future.” Yes indeed. Seeing how the world will unfold is incredibly difficult because of how convoluted second-order effects can become. So, with the legendary Mr. Berra providing me with […]
Read moreIntroduction Throughout numerous Red Teams in 2022, a common theme of Source Control Supply Chain attacks in GitHub repositories has emerged. After many hours manually hunting for and exploiting these attack paths, we’ve built an all-in-one toolkit called Gato (Github Attack Toolkit) for finding and attacking repositories where these misconfigurations are present. We released the […]
Read moreAs the chief information security officer (CISO), it is important to effectively communicate with the board of directors (BOD) and its audit subcommittee about the organization’s cyber risk posture and strategy. This can help the BOD understand the potential impact of cyber threats on the organization and make informed decisions about risk management, including capital […]
Read more