Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Process Injection on Linux: A Deep Dive into asminject.py
Watch as we explore Bishop Fox’s very own asminject.py, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.
Bridging the Gap Between Military and Civilian Work
Tune into our livestream session to hear Skillbridge cybersecurity success stories.
CloudFox in Action: Mapping Exploitable Paths in AWS
Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!
Bishop Fox Cloud Penetration Testing Methodology
Overview of Bishop Fox’s methodology for cloud security reviews.
The Mind Behind Nuclei, Demo with Sandeep Singh
Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.
Tool Talk: Unredacter
In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.
asminject.py: Compromise Trusted Linux Processes and Containers
This step-by-step technical guide highlights the capabilities of asminject.py, a code injection tool used to compromise Linux processes and containers.
Vinnie Liu: A Life in the Offensive Security Trenches
Ryan Naraine, Editor at SecurityConversations, interviews Bishop Fox's Co-Founder & CEO Vinnie Liu on the origins and evolution of the pen testing services business.
Ransomware Scenario Emulation Report with Illumio
Illumio, Inc. engaged Bishop Fox to measure the effectiveness of Illumio Core for blue teams to detect and contain a ransomware attack. The report details the findings identified during the course of the engagement, which started on March 10, 2022.
Watch a Special Livestream From DEF CON 30
Watch the lineup of leaders & influencers from the infosec community who joined us live at DEF CON 30!
Leveraging Nuclei for Scalable, Custom Vulnerability Scanning
In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.
CISO Stories featuring Will Lin, Founding Team Member at ForgePoint Capital
Will Lin, founding team member at ForgePoint Capital (and investor in Bishop Fox) and co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch, as well as his work supporting CISOs through collaboration and knowledge sharing.
CyberRisk Alliance Cloud Adoption Security Report
Explore key findings and insights from the CRA Business Intelligence Cloud Security Survey of more than 300 security leaders & practitioners.
2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management
Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!
Tool Talks: Debugging Ruby Exploits
In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.
Tool Talk: ripgen
In our fifth edition of the Tool Talk series, we explore ripgen, a subdomain discovery tool designed to significantly increase permutation combinations.
Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business
Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation.
Combating Ransomware with an Offensive Roadmap
Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.
Bishop Fox Secure Code Review Methodology
Overview of Bishop Fox’s methodology for Secure Code Review.
SC Media Special Event: Continuously Hacking Yourself
Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.
Evaluating Offensive Security Solutions: Top 50 Questions to Ask
To ensure your security investments offer complete visibility into your attack surface and uncover critical risks at scale, we've compiled questions to help you evaluate solutions. We focus on six key areas: attack surface discovery, exposure identification, triage, validation, remediation, and outputs.
SW Labs Category Overview: Attack Surface Management (ASM) Solutions
Comprehensive overview of the fast-growing Attack Surface Management category from the cybersecurity experts at Security Weekly Labs.
SW Labs Product Review: Cosmos Attack Surface Management Platform
SW Labs assessed Bishop Fox’s Cosmos (formerly CAST) the “Best Emerging Technology" Attack Surface Management Platform of 2021.
The Wolf in Sheep’s Clothing
See how low-risk exposures can become catalysts for destructive attacks. We include examples of exposures found in real-world environments, including a step-by-step view into how ethical hackers exploited them to reach high-value targets.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.