Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Guide

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Bishop Fox eBook cover Looking Toward Cosmos: Business Justification for Continuous Penetration Testing.
Guide

Looking Toward the Cosmos: Making the Case for Continuous Offensive Security

Download this eBook to uncover the factors and inputs used in our customizable ROI calculator that are critical to making the business case for continuous offensive testing. The output of the calculator is intended to help you draw a direct line from investment to risk mitigation that can be communicated to both technical and non-technical decision makers.

Vintage vinyl record sleeve featuring a purple fox with Greatest hits of offensive testing tools in 2022. Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools.
Guide

Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools

What’s better than a Top 10 List? An ultimate guide of all our favorite lists – from red team and cloud penetration tools TO our favorite music to hack to and the best reads for your offensive security journey. We’ve got you covered to level up your penetration testing game with this comprehensive guide of hacking goodies.

Preview cover page of the asminject.py technical guide highlighting the capabilities of it, a Linux code injection security tool.
Guide

asminject.py: Compromise Trusted Linux Processes and Containers

This step-by-step technical guide highlights the capabilities of asminject.py, a code injection tool used to compromise Linux processes and containers.

Top 50 Questions to Ask When Evaluating Offensive Security Providers check list first page preview
Guide

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.

Security Weekly Labs Product Reviews: SW Labs Attack Surface Management Category Overview, sponsored by Bishop Fox
Guide

SW Labs Product Review: Cosmos Attack Surface Management Platform

SW Labs assessed Bishop Fox’s Cosmos (formerly CAST) the “Best Emerging Technology" Attack Surface Management Platform of 2021.

Security Weekly Labs Product Reviews: SW Labs Attack Surface Management Category Overview, sponsored by Bishop Fox; preview of the cover page and two internal pages.
Guide

SW Labs Category Overview: Attack Surface Management (ASM) Solutions

Comprehensive overview of the fast-growing Attack Surface Management category from the cybersecurity experts at Security Weekly Labs.

ebook cover: "The wolf in Sheep Clothing" How low-risk exposures become catalysts for destructive attacks
Guide

The Wolf in Sheep’s Clothing

See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.

Bishop Fox Penetration Testing Resource Guide preview
Guide

Penetration Testing Resource Guide

This handy guide provides a list of great resources for learning to be a pen tester.

Illustration of 3 documents next to each other
Guide

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.

Bishop Fox Eyeballer ebook cover page
Guide

Eyeballer: Automating Security Triage with Machine Learning

This easy-to-follow guide explores the capabilities of Eyeballer, a first-of-its-kind AI-powered pen testing tool.

Tag Cyber Independent Assessment of Bishop Fox offensive security platform
Guide

Using Cyber Offensive Methods to Improve Defense

TAG Cyber provides an unbiased assessment of Bishop Fox’s offensive cybersecurity services and Cosmos platform.

Efficacy of Micro Segmentation Assessment by Bishop Fox
Guide

Quantifying the Impact of Micro-Segmentation Using Illumio ASP

Bishop Fox developed the industry’s first repeatable testing methodology to quantify the efficacy of micro-segmentation using the Illumio Adaptive Security Platform (ASP).

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.