Expert Analysis of Recent SaaS Attacks That Shocked Global Brands. Watch now

Featured Resource

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Watch our Def con 23 2015 rfidiggity pentester guide to hacking hf nfc and uhf rfid video
Workshops & Training

RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID

Have you ever attended an RFID hacking presentation and walked away with more questions than answers? This talk will finally provide practical guidance for penetration testers on hacking High Frequency (HF - 13.56 MHz) and Ultra-High Frequency (UHF – 840-960 MHz).
Watch our Brinks smart safe hacking video
Workshops & Training

Brink's Smart Safe Hacking

It’s possible for a thief to plug a USB drive into Brink’s CompuSafe Galileo, automate hacking the safe, and steal the cash inside. Our video explains this exploit in under 60 seconds.

Watch our Bsides lv 2014 untwisting the mersenne twister how i killed the prng video

Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG

Untwister is a tool designed to help pentesters predict random number sequences when an application generates them using an insecure algorithm. This presentation focuses on weaponizing what used to be theoretical into our tool: untwister.
Watch our Black hat usa 2005 catch me if you can video

Black Hat USA 2005 - Catch Me If You Can

Prepare to watch trusted forensics tools crumble. James C. Foster and Vincent T. Liu share over eighteen months of continued private forensic research, including ground-breaking vulnerabilities and key weaknesses in some of the most popular tools used by forensic examiners.
Watch our Black hat usa 2011 pulp google hacking video

Black Hat USA 2011 - Pulp Google Hacking

We once again tear down the basic assumptions about what Google/Bing Hacking is and the extent to which it can be exploited to target organizations and even governments.
Watch our Def con 20 2012 tenacious diggity video

DEF CON 20 (2012) - Tenacious Diggity

Check out all brand new tool additions to the Google Hacking Diggity Project - The Next Generation Search Engine Hacking Arsenal. We explore these tools and more in this DEMO rich presentation.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.