UPCOMING SLIVER WORKSHOP: Getting Started & 1.6 Features Learn More

Featured Guide

Red Teaming vs. Penetration Testing: What's the Difference?

Red Teaming and Penetration Testing are often confused—but they’re not the same. This guide breaks down the key differences to help you choose the right approach based on your security goals, whether you’re focused on compliance or preparing for real-world threats.

Top 50 Questions to Ask When Evaluating Offensive Security Providers check list first page preview
Guide

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.

ebook cover: "The wolf in Sheep Clothing" How low-risk exposures become catalysts for destructive attacks
Guide

The Wolf in Sheep’s Clothing

See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.

Bishop Fox Penetration Testing Resource Guide preview
Guide

Penetration Testing Resource Guide

This handy guide provides a list of great resources for learning to be a pen tester.

Illustration of 3 documents next to each other
Guide

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.

Bishop Fox Eyeballer ebook cover page
Guide

Eyeballer: Automating Security Triage with Machine Learning

This easy-to-follow guide explores the capabilities of Eyeballer, a first-of-its-kind AI-powered pen testing tool.

20 Tips To Make the Most of Your Pen Test Guide Cover Page
Guide

20 Tips to Make the Most of Your Pen Test

Whether you’ve conducted many pen tests or are about to embark on your first, this eBook contains helpful guidance for companies at every stage of security-program maturity.

Bishop Fox Nest Security Assessment What to Expect Guide C
Guide

What to Expect of Your Nest Security Assessment

This guide covers what to expect when engaging Bishop Fox to perform a Google Nest Security Assessment, including timeline, scoping, scheduling, and reporting.

Bishop Fox Google Partner What to Expect Guide C
Guide

What to Expect of Your Google Partner Security Assessment

This guide covers what to expect when engaging Bishop Fox to perform a Google Partner OAuth Application security assessment, including project timeline, onboarding and scoping, and deliverables.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.