AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Workshops & Training

Spoofy in Action: Advancing Domain Spoofing Detection

Spoofy in Action: Advancing Domain Spoofing Detection

Learn how to efficiently identify subdomain takeover vulnerabilities using Spoofy, an open-source tool that automates the assessment process and helps protect your organization from potential subdomain spoofing attacks.

Watch Workshop
Virtual Sessions

Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams

Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams

Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.

Watch Session
Guides

Looking Toward the Cosmos: Making the Case for Continuous Offensive Security

Looking Toward the Cosmos: Making the Case for Continuous Offensive Security

Download this eBook to uncover the factors and inputs used in our customizable ROI calculator that are critical to making the business case for continuous offensive testing. The output of the calculator is intended to help you draw a direct line from investment to risk mitigation that can be communicated to both technical and non-technical decision makers.

Read Guide
Customer Stories

John Deere Digital Security Journey: Securing Products Against Cyberattacks

John Deere Digital Security Journey: Securing Products Against Cyberattacks

Faced with securing complex, connected products, John Deere relied on in-depth product security reviews and ongoing protection through a managed offensive security platform.

Read Story
Virtual Sessions

Hacker Insights Revealed: Explore New SANS Survey Results

Hacker Insights Revealed: Explore New SANS Survey Results

In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.

Watch Session
Guides

Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools

Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools

What’s better than a Top 10 List? An ultimate guide of all our favorite lists – from red team and cloud penetration tools TO our favorite music to hack to and the best reads for your offensive security journey. We’ve got you covered to level up your penetration testing game with this comprehensive guide of hacking goodies.

Read Guide
Methodologies

Bishop Fox Red Team Methodology

Bishop Fox Red Team Methodology

This Red Team methodology document provides an overview of Bishop Fox's approach to Red Team engagements.

Read Methodology
Workshops & Training

Process Injection on Linux: A Deep Dive into asminject.py

Process Injection on Linux: A Deep Dive into asminject.py

Watch as we explore Bishop Fox’s very own asminject.py, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.

Watch Workshop
Virtual Sessions

Bridging the Gap Between Military and Civilian Work

Bridging the Gap Between Military and Civilian Work

Tune into our livestream session to hear Skillbridge cybersecurity success stories.

Watch Session
Workshops & Training

CloudFox in Action: Mapping Exploitable Paths in AWS

CloudFox in Action: Mapping Exploitable Paths in AWS

Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!

Watch Workshop
Methodologies

Bishop Fox Cloud Penetration Testing Methodology

Bishop Fox Cloud Penetration Testing Methodology

Overview of Bishop Fox’s methodology for cloud security reviews.

Read Methodology
Workshops & Training

The Mind Behind Nuclei, Demo with Sandeep Singh

The Mind Behind Nuclei, Demo with Sandeep Singh

Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.

Watch Workshop
Virtual Sessions

Tool Talk: Unredacter

Tool Talk: Unredacter

In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.

Watch Session
Guides

asminject.py: Compromise Trusted Linux Processes and Containers

asminject.py: Compromise Trusted Linux Processes and Containers

This step-by-step technical guide highlights the capabilities of asminject.py, a code injection tool used to compromise Linux processes and containers.

Read Guide
Virtual Sessions

Vinnie Liu: A Life in the Offensive Security Trenches

Vinnie Liu: A Life in the Offensive Security Trenches

Ryan Naraine, Editor at SecurityConversations, interviews Bishop Fox's Co-Founder & CEO Vinnie Liu on the origins and evolution of the pen testing services business.

Watch Session
Reports

Ransomware Scenario Emulation Report with Illumio

Ransomware Scenario Emulation Report with Illumio

Illumio, Inc. engaged Bishop Fox to measure the effectiveness of Illumio Core for blue teams to detect and contain a ransomware attack. The report details the findings identified during the course of the engagement, which started on March 10, 2022.

Read Report
Virtual Sessions

Watch a Special Livestream From DEF CON 30

Watch a Special Livestream From DEF CON 30

Watch the lineup of leaders & influencers from the infosec community who joined us live at DEF CON 30!

Watch Session
Virtual Sessions

Leveraging Nuclei for Scalable, Custom Vulnerability Scanning

Leveraging Nuclei for Scalable, Custom Vulnerability Scanning

In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.

Watch Session
Resource

CISO Stories featuring Will Lin, Founding Team Member at ForgePoint Capital

CISO Stories featuring Will Lin, Founding Team Member at ForgePoint Capital

Will Lin, founding team member at ForgePoint Capital (and investor in Bishop Fox) and co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch, as well as his work supporting CISOs through collaboration and knowledge sharing.

Learn More
Reports

CyberRisk Alliance Cloud Adoption Security Report

CyberRisk Alliance Cloud Adoption Security Report

Explore key findings and insights from the CRA Business Intelligence Cloud Security Survey of more than 300 security leaders & practitioners.

Read Report
Virtual Sessions

2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management

2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management

Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!

Watch Session
Virtual Sessions

Tool Talks: Debugging Ruby Exploits

Tool Talks: Debugging Ruby Exploits

In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.

Watch Session
Resource

Tool Talk: ripgen

Tool Talk: ripgen

In our fifth edition of the Tool Talk series, we explore ripgen, a subdomain discovery tool designed to significantly increase permutation combinations.

Learn More
Virtual Sessions

Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business

Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business

Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.