Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
praetorian.com
10
posts in the last 30 days
500,000
Vulnerabilities
, 14 That Matter: How
Exploit
Chain Analysis Cuts Through the Noise
praetorian.com
·
8h
Shadow
Admins
in Active Directory: Hidden Privilege Paths
Attackers
Exploit
praetorian.com
·
6d
Bypassing
LLM Supervisor Agents Through
Indirect
Prompt Injection
praetorian.com
·
1w
The Attack
Helix
:
Praetorian
Guard’s AI Architecture for Offensive Security
praetorian.com
·
2w
Meet
Vespasian
. It Sees What
Static
Analysis Can’t.
praetorian.com
·
2w
A Possible Solution to the Zodiac Killer
Z32
Cipher
praetorian.com
·
2w
Your API Has
Authorization
Bugs.
Hadrian
Finds Them.
praetorian.com
·
3w
Reflecting
on Your Tier Model: CVE-2025-33073 and the
One-Hop
Problem
praetorian.com
·
3w
Which
Came
First: The System Prompt, or the
RCE
?
praetorian.com
·
3w
Julius
v0.2.0: From 33 to 63 Probes — Now Detecting Cloud AI, Enterprise Inference, and RAG
Pipelines
praetorian.com
·
4w
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help