AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Bishop Fox Tool Talk Episode 8 asminject.py
Workshops & Training

Process Injection on Linux: A Deep Dive into asminject.py

Watch as we explore Bishop Fox’s very own asminject.py, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.

Watch Workshop
Livestream Veterans Skillbridge Roundtable featuring Brad Alaska, Cosmos Intern, Bishop Fox; Brock Logan, Analyst I, Bishop Fox
Virtual Sessions

Bridging the Gap Between Military and Civilian Work

Tune into our livestream session to hear Skillbridge cybersecurity success stories.

Watch Session
Bishop Fox Tool Talk episode 7 CloudFox to find exploitable attack paths in cloud infrastructure presented by three security consultants
Workshops & Training

CloudFox in Action: Mapping Exploitable Paths in AWS

Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!

Watch Workshop
Bishop Fox Cloud Penetration Testing Methodology cover page preview.
Methodologies

Bishop Fox Cloud Penetration Testing Methodology

Overview of Bishop Fox’s methodology for cloud security reviews.

Read Methodology
Sandeep Singh featured headshot for exclusive session on the Nuclei security tool demo.
Workshops & Training

The Mind Behind Nuclei, Demo with Sandeep Singh

Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.

Watch Workshop
Bishop Fox Tool Talk Episode 4 Unredacter with subtitle easily reverse redacted and pixelized text.
Virtual Sessions

Tool Talk: Unredacter

In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.

Watch Session
Preview cover page of the asminject.py technical guide highlighting the capabilities of it, a Linux code injection security tool.
Guides

asminject.py: Compromise Trusted Linux Processes and Containers

This step-by-step technical guide highlights the capabilities of asminject.py, a code injection tool used to compromise Linux processes and containers.

Read Guide
Headshot of Vinnie Liu, CEO at Bishop Fox interviewed by podcaster Ryan Naraine of Security Conversations
Virtual Sessions

Vinnie Liu: A Life in the Offensive Security Trenches

Ryan Naraine, Editor at SecurityConversations, interviews Bishop Fox's Co-Founder & CEO Vinnie Liu on the origins and evolution of the pen testing services business.

Watch Session
Ransomware scenario emulation report cover page and preview with ransomware readiness seal.
Reports

Ransomware Scenario Emulation Report with Illumio

Illumio, Inc. engaged Bishop Fox to measure the effectiveness of Illumio Core for blue teams to detect and contain a ransomware attack. The report details the findings identified during the course of the engagement, which started on March 10, 2022.

Read Report
Generic On Demand 1200x628
Virtual Sessions

Watch a Special Livestream From DEF CON 30

Watch the lineup of leaders & influencers from the infosec community who joined us live at DEF CON 30!

Watch Session
Tool Talk Episode three: Nuclei security tool with headshots of the four speakers on dark background.
Virtual Sessions

Leveraging Nuclei for Scalable, Custom Vulnerability Scanning

In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.

Watch Session
CISO Stories YouTube video thumbnail image featuring Will Lin headshot.
Resource

CISO Stories featuring Will Lin, Founding Team Member at ForgePoint Capital

Will Lin, founding team member at ForgePoint Capital (and investor in Bishop Fox) and co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch, as well as his work supporting CISOs through collaboration and knowledge sharing.

Learn More
CyberRisk Alliance Survey Report cover page and preview of internal page with graph. The cover title is
Reports

CyberRisk Alliance Cloud Adoption Security Report

Explore key findings and insights from the CRA Business Intelligence Cloud Security Survey of more than 300 security leaders & practitioners.

Read Report
GigaOm Special Webcast on Attack Surface Management solution featuring analyst Chris Ray with headshot
Virtual Sessions

2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management

Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!

Watch Session
Tool Talk Episode 6: Debugging Ruby Exploits
Virtual Sessions

Tool Talks: Debugging Ruby Exploits

In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.

Watch Session
Tool Talk Episode 5: ripgen for finding subdomain permutations
Resource

Tool Talk: ripgen

In our fifth edition of the Tool Talk series, we explore ripgen, a subdomain discovery tool designed to significantly increase permutation combinations.

Learn More
Webcast title in Futuristic Neon lettering: Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business.
Virtual Sessions

Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business

Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation.

Watch Session
Bishop Fox combats ransomware with an offensive Security Roadmap represented by a compass.
Virtual Sessions

Combating Ransomware with an Offensive Roadmap

Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.

Watch Session
Preview of Bishop Fox Secure Code Review Methodology cover page on dark purple background.
Methodologies

Bishop Fox Secure Code Review Methodology

Overview of Bishop Fox’s methodology for Secure Code Review.

Read Methodology
SC Media Continuously Hacking Yourself on-demand webcast about attack surface management and continuous pen testing
Virtual Sessions

SC Media Special Event: Continuously Hacking Yourself

Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.

Watch Session
Top 50 Questions to Ask When Evaluating Offensive Security Providers check list first page preview
Guides

Evaluating Offensive Security Solutions: Top 50 Questions to Ask

To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.

Read Guide
Security Weekly Labs Product Reviews: SW Labs Attack Surface Management Category Overview, sponsored by Bishop Fox; preview of the cover page and two internal pages.
Guides

SW Labs Category Overview: Attack Surface Management (ASM) Solutions

Comprehensive overview of the fast-growing Attack Surface Management category from the cybersecurity experts at Security Weekly Labs.

Read Guide
Security Weekly Labs Product Reviews: SW Labs Attack Surface Management Category Overview, sponsored by Bishop Fox
Guides

SW Labs Product Review: Cosmos Attack Surface Management Platform

SW Labs assessed Bishop Fox’s Cosmos (formerly CAST) the “Best Emerging Technology" Attack Surface Management Platform of 2021.

Read Guide
ebook cover:
Guides

The Wolf in Sheep’s Clothing

See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.

Read Guide

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.