GigaOm Radar for Attack Surface Management: Bishop Fox Named "Leader" and "Fast Mover". Read the report to learn why

Featured Guide

Getting Red Teaming Right: A How-to Guide

Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.

Bishop Fox's Ransomware Readiness eBook with compass imagery
Guide

The Offensive Security Guide to Ransomware Readiness

image of purple eBook cover with blue text and white page with graphs on dark background
Guide

Fortifying Your Applications: A Guide to Penetration Testing

A cover report imagery with charts and infinity ring
Guide

Shifting Left: A DevSecOps Field Guide

Bishop Fox eBook cover Looking Toward Cosmos: Business Justification for Continuous Penetration Testing.
Guide

Looking Toward the Cosmos: Making the Case for Continuous Offensive Security

Vintage vinyl record sleeve featuring a purple fox with Greatest hits of offensive testing tools in 2022. Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools.
Guide

Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools

Ransomware readiness self-assessment guide cover and 2 white pages showing a questionnaire and one purple and black cover page with a maze and blue writing Ransomware self Readiness guide. All on dark purple to black background.
Guide

Ready or Not: A Ransomware Self-Assessment

Subscribe to Bishop Fox's Security Blog

Be first to learn about latest tools, advisories, and findings.

Preview cover page of the asminject.py technical guide highlighting the capabilities of it, a Linux code injection security tool.
Guide

asminject.py: Compromise Trusted Linux Processes and Containers

Top 50 Questions to Ask When Evaluating Offensive Security Providers check list first page preview
Guide

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

ebook cover: "The wolf in Sheep Clothing" How low-risk exposures become catalysts for destructive attacks
Guide

The Wolf in Sheep’s Clothing

Bishop Fox Penetration Testing Resource Guide preview
Guide

Penetration Testing Resource Guide

Illustration of 3 documents next to each other
Guide

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

Bishop Fox Eyeballer ebook cover page
Guide

Eyeballer: Automating Security Triage with Machine Learning

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.