Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Swagger Jacker: Improved Auditing of OpenAPI Definition Files
Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.
Ace the OSEP Exam with Sliver Framework
Unlock the secrets of passing the OSEP exam with our senior security expert, Jon Guild. Join us as Jon shares his invaluable tips and tricks for conquering this benchmark exam designed for penetration testers.
Pragmatic AI & LLM Security Mitigations for Enterprises
Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.
OWASP ASVS: Unlocking Stronger Application Security
Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.
Strengthening Incident Response: Combining Tabletop Exercises with Red Team Engagements
Learn how integrating tabletop exercises with red team assessments creates a more comprehensive evaluation of your organization's incident response capabilities. Security expert Shanni Prutchi shares practical approaches for testing both your technical controls and response processes against realistic attack scenarios.
Cosmos: Protecting the Perimeter
To understand the vulnerability landscape that organizations are up against, we meticulously examined 17,000 data points, extracted from over 110 billion automations, within a 12-month period. Download the report to view a comprehensive propensity model that allows security and organizational leadership to visualize the potential impact of leaving vulnerable exposures to chance.
The Offensive Security Blueprint for Financial Services
Bishop Fox's Financial Services industry cut provides a comprehensive analysis of offensive security trends within financial services, using industry data gathered from our joint research report with the Ponemon Institute.
AppSec Arsenal: Modern Exploitation Techniques & Advanced Defense Strategies
In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.
Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities
In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.
Offensive Security Arsenal: Building and Mastering Custom Security Tools
In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.
Red Team Reality: Advanced Strategies for Modern Attack Simulation
In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.
The Art of Human Hacking: Social Engineering Success Stories
In this session, hear from Chris Kirsch, CEO and co-founder of runZero.
Building Better Security Tools: Inside the Mind of an Open-Source Innovator
In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.
The Human Side of Security: Creating Impact Through Leadership & Advocacy
In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.
Malware Analysis Mastery: A Conversation with John Hammond
In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.
The Pentester's Journey: Expert Insights from a Security Veteran
In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.
JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing
Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.
Hacker Evolution: From Technical Mastery to Visionary Leadership
Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.
Outpacing Adversaries in the Cloud: An Offensive Security Guide
Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.
Ponemon Institute Report 2023
In a new study conducted with Bishop Fox, the Ponemon Institute surveyed nearly 700 security and IT practitioners who actively employ offensive security practices. The analysis explores where enterprises are focusing offensive security efforts and the drivers behind them.
Breaking Down Q2's Critical CVEs: From Discovery to Exploitation
Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.
Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study
Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.
Getting Red Teaming Right: A How-to Guide
Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.
How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security
Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.