Learn how Mandiant Red Team is using Gemini and LLMs for adversarial emulation and defense.
Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data and Git history. - praetorian-inc/noseyparker
Learn how Mandiant Red Team is using Gemini and LLMs for adversarial emulation and defense.
Discover DeepPass2 - a secret scanning tool combining BERT-based model and LLMs to detect free-form passwords, and other structured tokens and secrets with high accuracy.
Learn how to extend Nemesis 2.X with custom file enrichment modules, Yara/Nosey Parker rules, and C2 connectors - covering both the manual development workflow and the new Codex and Claude Code skills for automated module creation and testing.
Nemesis 2.2 introduces large disk image processing, LLM agents for automated finding triage and credential analysis, full Chromium DPAPI decryption support, host reporting, and significant performance optimizations, making it a powerful platform for both offensive and defensive file enrichment and risk assessment at scale.
An exposed GitHub token could have been used to launch a supply chain attack on GitHub CodeQL, resulting in source code exposure and repository tampering of CodeQL users.
Harness the power of Python for production-grade data analysis and machine learning. Discover essential tools and best practices for seamless deployments.
Open source secret scanner with 450+ rules. Detect and validate credentials via CLI, Go library, Burp Suite extension, or Chrome. Built by Praetorian.
A (directed) graph is a set of nodes, connected by arrows (edges). The nodes and edges may contain data. Here are some graphs: All graphs made with graphviz (source) Graphs are ubiquitous in software engineering: Package dependencies form directed graphs, as do module imports. The internet is a graph of links between webpages. Model checkers analyze software by exploring the “state space” of all possible configurations.