Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

Bishop Fox Tool Talk Episode 8 asminject.py
Workshops & Training

Process Injection on Linux: A Deep Dive into asminject.py

Watch as we explore Bishop Fox’s very own asminject.py, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.

Bishop Fox Tool Talk episode 7 CloudFox to find exploitable attack paths in cloud infrastructure presented by three security consultants
Workshops & Training

CloudFox in Action: Mapping Exploitable Paths in AWS

Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!

Sandeep Singh featured headshot for exclusive session on the Nuclei security tool demo.
Workshops & Training

The Mind Behind Nuclei, Demo with Sandeep Singh

Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.

Bishop Fox Tool Talk Episode 4 Unredacter with subtitle easily reverse redacted and pixelized text.
Virtual Session

Tool Talk: Unredacter

In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.

Preview cover page of the asminject.py technical guide highlighting the capabilities of it, a Linux code injection security tool.
Guides & Report

asminject.py: Compromise Trusted Linux Processes and Containers

This step-by-step technical guide highlights the capabilities of asminject.py, a code injection tool used to compromise Linux processes and containers.

Tool Talk Episode three: Nuclei security tool with headshots of the four speakers on dark background.
Virtual Session

Leveraging Nuclei for Scalable, Custom Vulnerability Scanning

In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.

Tool Talk Episode 6: Debugging Ruby Exploits
Virtual Session

Tool Talks: Debugging Ruby Exploits

In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.

Top 50 Questions to Ask When Evaluating Offensive Security Providers check list first page preview
Guides & Report

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.

Headshots of security consultants, Matt Keeley and Joe Sechman presenting episode 2 of Bishop Fox Tool Talks: Fuzzing.
Virtual Session

A Deep Dive Into Fuzzing

Get the buzz on fuzz testing in software development.

Bishop Fox Tool Talk Eyeballer episode 1, now on demand - Spend less time hunting and more time hacking.
Virtual Session

Tool Talk: Eyeballer

In Episode 1 of our Tool Talk series we explore Eyeballer, an AI-powered, open-source tool designed to help penetration testers assess large-scale external perimeters.

Illustration of computer exporting data
Workshops & Training

Fuzzing: Get the buzz on fuzz testing in software development

This slide deck includes:

  • Fuzzing Basics
  • How Fuzzing Works
  • Popular Fuzzing Tools
Screenshot of video of Dan Petro interviewing John L about the Unredacter challenge
Workshops & Training

Unredacter Challenge: John L.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as John L. showcases his solution.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.