Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Featured Resource

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

Livestream Veterans Skillbridge Roundtable featuring Brad Alaska, Cosmos Intern, Bishop Fox; Brock Logan, Analyst I, Bishop Fox

Livestream: Bridging the Gap Between Military and Civilian Work

Tune into our livestream session to hear Skillbridge cybersecurity success stories.

Bishop Fox and SANS Inside the Mind of Modern Adversaries Infographic

Inside the Mind of Modern Adversaries

SANS, in partnership with Bishop Fox, surveyed 280 ethical hackers to gain insight into the mind and methods of modern adversaries – including what works and what doesn’t. Here are our preliminary findings.

Bishop Fox Tool Talk episode 7 CloudFox to find exploitable attack paths in cloud infrastructure presented by three security consultants

Tool Talk: CloudFox

Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!

Cover page of the bishop Fox cloud penetration testing methodology

Bishop Fox Cloud Penetration Testing Methodology

Overview of Bishop Fox’s methodology for cloud security reviews.

Sandeep Singh featured headshot for exclusive session on the Nuclei security tool demo.

The Mind Behind Nuclei, Demo with Sandeep Singh

Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.

Bishop Fox Tool Talk Episode 4 Unredacter with subtitle easily reverse redacted and pixelized text.

Tool Talk: Unredacter

In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.

Preview cover page of the technical guide highlighting the capabilities of it, a Linux code injection security tool.
Guide Compromise Trusted Linux Processes and Containers

This step-by-step technical guide highlights the capabilities of, a code injection tool used to compromise Linux processes and containers.

Headshot of Vinnie Liu, CEO at Bishop Fox interviewed by podcaster Ryan Naraine of Security Conversations

Vinnie Liu: A Life in the Offensive Security Trenches

Ryan Naraine, Editor at SecurityConversations, interviews Bishop Fox's Co-Founder & CEO Vinnie Liu on the origins and evolution of the pen testing services business.

Ransomware scenario emulation report cover page and preview with ransomware readiness seal.

Ransomware Scenario Emulation Report with Illumio

Illumio, Inc. engaged Bishop Fox to measure the effectiveness of Illumio Core for blue teams to detect and contain a ransomware attack. The report details the findings identified during the course of the engagement, which started on March 10, 2022.

Generic On Demand 1200x628

Watch a Special Livestream From DEF CON 30

Watch the lineup of leaders & influencers from the infosec community who joined us live at DEF CON 30!

Tool Talk Episode three: Nuclei security tool with headshots of the four speakers on dark background.

Tool Talk: Nuclei

In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.

Application Security webcast: Getting the Most of your Pen Test with Dan Petro headshot

Application Security: Getting the Most Out of Your Penetration Tests

Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.