Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.
 
                            Iotium: Securing an Industrial IoT Platform
IoTium, a solution designed for the Industrial Internet of Things (IIoT), enlisted Bishop Fox to verify the security of their product offering.
 
                            Drone Hacking: Wireless Mouse Flyby Hijack with DangerDrone
Some quick live footage of flying the Danger Drone, a free penetration testing platform from Bishop Fox.
 
                            Zephyr Health: Building a Healthy Security Program
Designed a security program that meets the highest privacy standards to protect sensitive patient health data.
 
                            Weaponizing Machine Learning
 
                            DEF CON 25 (2017) - Game of Drones
 
                            Drone Hacking: Defeating Net Defense Products with a Protective Chicken Wire Cage
 
                            Drone Hacking: SKYNET Shotgun Shells - Drone Net Shell Testing
 
                            Weaponizing Machine Learning: Humanity Was Overrated Anyway
 
                            DeepHack Demo - Exploiting SQLi by Using an Open-source Hacking AI Tool
 
                            Lord of the Bing - Search Engine Hacking
 
                            How We Can Stop Email Spoofing
 
                            Danger Drone - Arsenal DEMO
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.