AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Featured Resource

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Preview of Bishop Fox Red teaming Guide cover page on dark purple background.
Guide

Getting Red Teaming Right: A How-to Guide

Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.

Panelist headshots for fireside chat  How the National Cybersecurity Strategy Will Shape the Future of Offensive Security.
Virtual Session

How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security

Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.

OWASP ASVS Demystified digital guide on purple lock background.
Guide

OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing

In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.

Preview of three pages of the IDC report on how attack surface management reduces risk on dark purple background.
Report

IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk

Get new analyst insights on the benefits of continuous testing.

Webcast title: Notes from the dark side next to two light cybers on dark purple background.
Virtual Session

Notes from the Dark Side: What Our Data Reveals About the Attack Surface

Join our offensive security experts as they share insights gleaned from analyzing twelve months of findings captured in Cosmos, our award-winning attack surface management platform.

Tool Talk Episode 10 Burp Suite
Workshops & Training

Powering Up Burp Suite: Building Custom Extensions for Advanced Web Application Testing

Learn how to power up web application security testing with tips on creating customized extensions featuring BurpCage, an extension that replaces any image proxied through Burp Suite leveraging the Montoya API.

Preview of Bishop Fox Incident Response and Tabletop Exercise Methodology.
Methodology

Bishop Fox Tabletop Exercise Methodology

Download Bishop Fox's IR tabletop exercise methodology to understand how we develop realistic attack scenarios, facilitate collaborative exercises, and assess your organization's incident response readiness.

Preview of the Bishop Fox Social Engineering methodology on dark background.
Methodology

Bishop Fox Social Engineering Methodology

Get Bishop Fox's social engineering testing methodology. See how we simulate phishing, vishing, and physical attacks to strengthen your security awareness.

Preview of the Bishop Fox cybersecurity style guide pamphlet on dark purple background.
Guide

Cybersecurity Style Guide v2.0

Designed for security researchers, this guide is an invaluable resource for advice on which cybersecurity terms to use in reports and how to use them correctly.

Datasheet

Threat Modeling Datasheet

Learn how threat modeling proactively addresses security issues across the software development life cycle with in-depth analysis of application design, threats, and countermeasures that become foundational to ongoing DevOps processes.
Datasheet

Social Engineering Datasheet

Learn how social engineering goes beyond conventional phishing exercises to explore the depths of how adversaries can exploit your users, empowering you with insights to improve your security awareness program and related controls like email and file security.
Datasheet

Secure Code Review Datasheet

Learn how secure code review combines cutting-edge automation with meticulous manual review, ensuring the full spectrum of code-base vulnerabilities are proactively eliminated before attackers have a fighting chance.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.