Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
Introduction to Linux - Privilege Escalation Methods
Presentation from Day of Shecurity 2019 explores privilege escalation methods in Linux.
Pose a Threat: How Perceptual Analysis Helps Bug Hunters
Presentation from OWASP AppSec California 2019 offers up dirty tricks to optimize the hunt for security exposures.
Coinbase: Managing Security Through Collaboration
Change Healthcare: Securing a Competitive Advantage
Securing Mobile Security with Bluebox
Iotium: Securing an Industrial IoT Platform
IoTium, a solution designed for the Industrial Internet of Things (IIoT), enlisted Bishop Fox to verify the security of their product offering.
Drone Hacking: Wireless Mouse Flyby Hijack with DangerDrone
Some quick live footage of flying the Danger Drone, a free penetration testing platform from Bishop Fox.
Zephyr Health: Building a Healthy Security Program
Designed a security program that meets the highest privacy standards to protect sensitive patient health data.
Weaponizing Machine Learning
DEF CON 25 (2017) - Game of Drones
Drone Hacking: Defeating Net Defense Products with a Protective Chicken Wire Cage
Drone Hacking: SKYNET Shotgun Shells - Drone Net Shell Testing
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.