Aug 15, 2025
Vulnerability Discovery with LLM-Powered Patch Diffing
By Jon Williams
Aug 06, 2025
Next-Level Fingerprinting: Tools, Logic, and Tactics
By Aaron Ringo
Jul 09, 2025
You’re Pen Testing AI Wrong: Why Prompt Engineering Isn’t Enough
By Brian D.
Jun 26, 2025
Sitecore Experience Platform Vulnerabilities: Critical Update Needed for Versions 10.1 to 10.3
By Bishop Fox Researchers
Jun 25, 2025
Sipping from the CVE Firehose: How We Prioritize Emerging Threats for Real-World Impact
By Nate Robb
Jun 18, 2025
2025 Red Team Tools – Cloud & Identity Exploitation, Evasion & Developer Libraries
By Bishop Fox
Subscribe to our blog and advisories
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
Jun 04, 2025
2025 Red Team Tools – C2 Frameworks, Active Directory & Network Exploitation
By Bishop Fox
Mar 31, 2025
Epic Fails and Heist Tales: A Red Teamer’s Journey to Deadwood
By Alethe Denis
Mar 24, 2025
Rust for Malware Development
By Nick Cerne
Mar 21, 2025
SonicWall-CVE-2024-53704: Exploit Details
By Jon Williams
Mar 18, 2025
Tomcat CVE-2025-24813: What You Need to Know
By Jon Williams
Feb 24, 2025
Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware
By Jon Williams
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.