AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Workshops & Training

Workshops & Training

Building Tools: What, When, and How

Building Tools: What, When, and How

Surrounded by security tools but still tempted to “just build it”? This hands-on workshop breaks down when custom tooling is worth it, when it’s not, and how to build fast, focused tools without overengineering.

Watch Workshop
Workshops & Training

Sliver Workshop Part 3: Building Better Encoders

Sliver Workshop Part 3: Building Better Encoders

In our third Sliver workshop, we explore how Sliver handles traffic encoding by default and how attackers can extend its capabilities with custom Wasm-based encoders. We dive into Sliver’s encoder framework works, what’s possible with WebAssembly, and how to design and test your own encoders.

Watch Workshop
Workshops & Training

Demystifying 5G Security: Understanding the Registration Protocol

Demystifying 5G Security: Understanding the Registration Protocol

In this hands-on workshop, Senior Security Consultant Drew Jones will break down the fundamentals of the 5G registration protocol, explore where security gaps can emerge, and walk through a live simulated lab demonstrating real-world vulnerabilities.

Watch Workshop
Workshops & Training

Sliver Workshop Part 2: Staging & Automation

Sliver Workshop Part 2: Staging & Automation

In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement, including TCP, and wrap up by exploring automation options using the SliverPy project.

Watch Workshop
Workshops & Training

Sliver Workshop Part 1: Getting Started & 1.6 Features

Sliver Workshop Part 1: Getting Started & 1.6 Features

Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.

Watch Workshop
Workshops & Training

Patch Perfect: Harmonizing with LLMs to Find Security Vulns

Patch Perfect: Harmonizing with LLMs to Find Security Vulns

This talk led by Bishop Fox researchers Caleb Gross & Josh Shomo cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used products.

Watch Workshop
Workshops & Training

Smart Grills Get Smarter: Improving IoT Security One Device at a Time

Smart Grills Get Smarter: Improving IoT Security One Device at a Time

Bishop Fox Security Consultant, Nisk Cerne discovered and worked with Traeger Grills to disclose a vulnerability in the company’s embedded Wi-Fi Controller that allows users to connect to and control their grills remotely.

Watch Workshop
Workshops & Training

Come WiFind Me: WiFi & Other RF Surveillance

Come WiFind Me: WiFi & Other RF Surveillance

Join Alissa Gilbert (dnsprincess) as she dispels myths around RF tracking, negates some fears, and gives completely new ones in its place.

Watch Workshop
Workshops & Training

Sliver Mastery: Dominating Active Directory Through Advanced Trust Exploitation

Sliver Mastery: Dominating Active Directory Through Advanced Trust Exploitation

Senior security expert Jon Guild demonstrates how to use the Sliver C2 framework to develop advanced offensive security skills. Arm yourself with the knowledge and skills of enumeration, lateral movement, and escalation techniques from first-hand experience in a vulnerable lab environment.

Watch Workshop
Workshops & Training

CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks

CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks

Watch the CloudFoxable demo to see a gamified cloud hacking sandbox where users can find latent attack paths in an intentionally vulnerable AWS environment.

Watch Workshop
Workshops & Training

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

Swagger Jacker: Improved Auditing of OpenAPI Definition Files

Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.

Watch Workshop
Workshops & Training

Ace the OSEP Exam with Sliver Framework

Ace the OSEP Exam with Sliver Framework

Unlock the secrets of passing the OSEP exam with our senior security expert, Jon Guild. Join us as Jon shares his invaluable tips and tricks for conquering this benchmark exam designed for penetration testers.

Watch Workshop
Virtual Sessions

JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing

JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing

Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.

Watch Session
Workshops & Training

Powering Up Burp Suite: Building Custom Extensions for Advanced Web Application Testing

Powering Up Burp Suite: Building Custom Extensions for Advanced Web Application Testing

Learn how to power up web application security testing with tips on creating customized extensions featuring BurpCage, an extension that replaces any image proxied through Burp Suite leveraging the Montoya API.

Watch Workshop
Workshops & Training

How Attackers Slip Past EDR: A Live Look at LoLBins in Action

How Attackers Slip Past EDR: A Live Look at LoLBins in Action

Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.

Watch Workshop
Workshops & Training

CVE Spotlight: Breaking Down Zimbra’s RCE Vulnerabilities

CVE Spotlight: Breaking Down Zimbra’s RCE Vulnerabilities

Watch the inaugural episode of our What the Vuln livestream series as we examine Zimbra Zip Path Traversal vulnerabilities, CVE-2022-27925 and CVE-2022-37042.

Watch Workshop
Workshops & Training

Spoofy in Action: Advancing Domain Spoofing Detection

Spoofy in Action: Advancing Domain Spoofing Detection

Learn how to efficiently identify subdomain takeover vulnerabilities using Spoofy, an open-source tool that automates the assessment process and helps protect your organization from potential subdomain spoofing attacks.

Watch Workshop
Workshops & Training

Process Injection on Linux: A Deep Dive into asminject.py

Process Injection on Linux: A Deep Dive into asminject.py

Watch as we explore Bishop Fox’s very own asminject.py, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.

Watch Workshop
Workshops & Training

CloudFox in Action: Mapping Exploitable Paths in AWS

CloudFox in Action: Mapping Exploitable Paths in AWS

Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!

Watch Workshop
Workshops & Training

The Mind Behind Nuclei, Demo with Sandeep Singh

The Mind Behind Nuclei, Demo with Sandeep Singh

Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.

Watch Workshop
Workshops & Training

Fuzzing: Get the buzz on fuzz testing in software development

Fuzzing: Get the buzz on fuzz testing in software development

This slide deck includes:

  • Fuzzing Basics
  • How Fuzzing Works
  • Popular Fuzzing Tools

Watch Workshop
Workshops & Training

Unredacter Challenge: John L.'s Solution

Unredacter Challenge: John L.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as John L. showcases his solution.

Watch Workshop
Workshops & Training

Unredacter Challenge: Shawn A.'s Solution

Unredacter Challenge: Shawn A.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Shawn A. showcases his solution.

Watch Workshop
Workshops & Training

Unredacter Challenge: Alejandro's Solution

Unredacter Challenge: Alejandro's Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Alejandro showcases his solution.

Watch Workshop

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.