AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Guides

Red Team Vendors Evaluation Matrix resource graphic by Bishop Fox featuring a red teaming vendor evaluation worksheet.
Guides

Red Team Vendor Evaluation Worksheet

The Red Team Vendor Evaluation Matrix Worksheet is designed to help security leaders evaluate red team vendors thoughtfully before engagement using a structured, question-driven approach.

Read Guide
image of teal guide cover with black text and white page on dark background
Guides

Fortifying Your Applications: A Guide to Penetration Testing

Download this guide to explore key aspects of application penetration testing, questions to ask along the way, how to evaluate vendors, and our top recommendations to make the most of your pen test based on almost two decades of experience and thousands of engagements.

Read Guide
Thumbnail of the Bishop Fox guide on LLM-Assisted Vulnerability Research.
Guides

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Read Guide
Red Team Readiness Guide - Key questions to ask before a red team engagement. Bishop Fox resource for assessing cybersecurity preparedness.
Guides

Red Team Readiness Guide

The Red Team Readiness Guide is a practical, question-driven planning framework that helps security leaders align stakeholders, clarify objectives, and evaluate organizational readiness ahead of a Red Team engagement. Use it to avoid common pitfalls, define business-relevant goals, and set the stage for maximum impact.

Read Guide
Bishop Fox Red Team Readiness Assessment resource image, featuring bold red and gray text over a black background and a preview of a planning questionnaire for red team engagement objectives.
Guides

Red Team Readiness Assessment

The Red Team Readiness Assessment is a guided self-assessment worksheet that helps security teams evaluate their preparedness, align stakeholders, and plan more effective Red Team engagements. Use it to define objectives, set scope, and establish the protocols needed for a successful simulation.

Read Guide
Mockup of Bishop Fox's Guide to DORA Threat-Led Pen Testing
Guides

FAQ Guide: Acquiring DORA Threat-Led Penetration Testing

Bishop Fox’s comprehensive DORA FAQ guide walks you through everything you need to know about fulfilling these critical requirements. This resource is a must-have for financial institutions looking to stay ahead of DORA’s complex compliance landscape.

Read Guide
Ponemon report on offensive security for Financial Services title with preview of the guide.
Guides

The Offensive Security Blueprint for Financial Services

Bishop Fox's Financial Services industry cut provides a comprehensive analysis of offensive security trends within financial services, using industry data gathered from our joint research report with the Ponemon Institute.

Read Guide
Preview of Bishop Fox new offensive security guide on Cloud Penetration Testing titled: Outpacing adversaries in the cloud
Guides

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.

Read Guide
Preview of Bishop Fox Red teaming Guide cover page on dark purple background.
Guides

Getting Red Teaming Right: A How-to Guide

Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.

Read Guide
OWASP ASVS Demystified digital guide on purple lock background.
Guides

OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing

In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.

Read Guide
Preview of the Bishop Fox cybersecurity style guide pamphlet on dark purple background.
Guides

Cybersecurity Style Guide v2.0

Designed for security researchers, this guide is an invaluable resource for advice on which cybersecurity terms to use in reports and how to use them correctly.

Read Guide
Cover page of the SANS Report Hacker Survey 2022
Guides

SANS Institute: Inside the Minds & Methods of Modern Adversaries

This inaugural report, in partnership with Bishop Fox, surveyed 280 ethical hackers to understand how adversaries think about the attack surfaces that they seek to exploit.

Read Guide
Bishop Fox's Ransomware Readiness eBook with compass imagery
Guides

The Offensive Security Guide to Ransomware Readiness

Our ransomware readiness guide helps you understand your current state of ransomware readiness, prepare for ransomware attacks, identify gaps in your current strategy, and measure progress to continually enhance readiness.

Read Guide
A cover report imagery with charts and infinity ring
Guides

Shifting Left: A DevSecOps Field Guide

Our eBook offers practical recommendations on how developers and security teams alike can move towards a DevSecOps model in any organization – with a goal of shared responsibility and creating a perpetual and repeatable process.

Read Guide
Bishop Fox eBook cover Looking Toward Cosmos: Business Justification for Continuous Penetration Testing.
Guides

Looking Toward the Cosmos: Making the Case for Continuous Offensive Security

Download this eBook to uncover the factors and inputs used in our customizable ROI calculator that are critical to making the business case for continuous offensive testing. The output of the calculator is intended to help you draw a direct line from investment to risk mitigation that can be communicated to both technical and non-technical decision makers.

Read Guide
Vintage vinyl record sleeve featuring a purple fox with Greatest hits of offensive testing tools in 2022. Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools.
Guides

Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools

What’s better than a Top 10 List? An ultimate guide of all our favorite lists – from red team and cloud penetration tools TO our favorite music to hack to and the best reads for your offensive security journey. We’ve got you covered to level up your penetration testing game with this comprehensive guide of hacking goodies.

Read Guide
Preview cover page of the asminject.py technical guide highlighting the capabilities of it, a Linux code injection security tool.
Guides

asminject.py: Compromise Trusted Linux Processes and Containers

This step-by-step technical guide highlights the capabilities of asminject.py, a code injection tool used to compromise Linux processes and containers.

Read Guide
Top 50 Questions to Ask When Evaluating Offensive Security Providers check list first page preview
Guides

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.

Read Guide
Security Weekly Labs Product Reviews: SW Labs Attack Surface Management Category Overview, sponsored by Bishop Fox
Guides

SW Labs Product Review: Cosmos Attack Surface Management Platform

SW Labs assessed Bishop Fox’s Cosmos (formerly CAST) the “Best Emerging Technology" Attack Surface Management Platform of 2021.

Read Guide
Security Weekly Labs Product Reviews: SW Labs Attack Surface Management Category Overview, sponsored by Bishop Fox; preview of the cover page and two internal pages.
Guides

SW Labs Category Overview: Attack Surface Management (ASM) Solutions

Comprehensive overview of the fast-growing Attack Surface Management category from the cybersecurity experts at Security Weekly Labs.

Read Guide
ebook cover:
Guides

The Wolf in Sheep’s Clothing

See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.

Read Guide
Bishop Fox Penetration Testing Resource Guide preview
Guides

Penetration Testing Resource Guide

This handy guide provides a list of great resources for learning to be a pen tester.

Read Guide
Illustration of 3 documents next to each other
Guides

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.

Read Guide
Bishop Fox Eyeballer ebook cover page
Guides

Eyeballer: Automating Security Triage with Machine Learning

This easy-to-follow guide explores the capabilities of Eyeballer, a first-of-its-kind AI-powered pen testing tool.

Read Guide

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.