Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
What Bad Could Happen? Managing Application Risk with Threat Modeling
What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.
DevSecOps and Application Penetration Testing: Defying the Myth
On-demand webcast dives into the role of application penetration testing in today’s software development lifecycle (SDLC).
Fuzzing: Get the buzz on fuzz testing in software development
This slide deck includes:
Managing Application Security Risk with Threat Modeling
Bishop Fox Hybrid Application Assessment Methodology
Overview of Bishop Fox’s methodology for hybrid application penetration testing.
Bishop Fox Application Penetration Testing Methodology
Overview of Bishop Fox’s methodology for application penetration testing.
.Net Roulette Exploiting Insecure Deserialization in Telerik UI
DerpCon 2020 presentation reviews how .NET deserialization works and how to get shells on real applications.
Ham Hacks: Breaking into the world of software-defined radio
DerpCon 2020 presentation explores how to find, capture, and reverse-engineer RF signals.
Reverse Engineering Mobile Apps
Presentation from BSides Las Vegas 2019 demonstrates the successful exploitation of transit system mobile apps.
AirDroid Exploit Demo
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.