New from Ponemon Institute: The State of Offensive Security in 2023. Read the Report ›
What the Vuln: EDR Bypass with LoLBins
Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.
What the Vuln: Zimbra
Watch the inaugural episode of our What the Vuln livestream series as we examine Zimbra Zip Path Traversal vulnerabilities, CVE-2022-27925 and CVE-2022-37042.
Tool Talk: Spoofy
Watch to explore Spoofy, a domain spoofing tool that checks whether a list of domains (in bulk) can be spoofed based on SPF and DMARC records.
Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams
Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.
Hacker Insights Revealed: Explore New SANS Survey Results
In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.
Tool Talk: asminject.py
Watch as we explore Bishop Fox’s very own asminject.py, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.
Livestream: Bridging the Gap Between Military and Civilian Work
Tune into our livestream session to hear Skillbridge cybersecurity success stories.
Tool Talk: CloudFox
Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!
The Mind Behind Nuclei, Demo with Sandeep Singh
Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.
Tool Talk: Unredacter
In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.
Tool Talk: Nuclei
In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.
Application Security: Getting the Most Out of Your Penetration Tests
Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.