Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Combatting Adversaries: Proactive Social Engineering & Network Testing
RSA Conference 2023: Leadership Perspectives in Cybersecurity - From CISOs to Founders
Shifting Left: A DevSecOps Field Guide
Penetrating the Cloud: Uncovering Unknown Vulnerabilities
Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks
How Attackers Slip Past EDR: A Live Look at LoLBins in Action
CVE Spotlight: Breaking Down Zimbra’s RCE Vulnerabilities
Spoofy in Action: Advancing Domain Spoofing Detection
Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams
Looking Toward the Cosmos: Making the Case for Continuous Offensive Security
John Deere Digital Security Journey: Securing Products Against Cyberattacks
Hacker Insights Revealed: Explore New SANS Survey Results
Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools
Bishop Fox Red Team Methodology
Process Injection on Linux: A Deep Dive into asminject.py
Bridging the Gap Between Military and Civilian Work
CloudFox in Action: Mapping Exploitable Paths in AWS
Bishop Fox Cloud Penetration Testing Methodology
The Mind Behind Nuclei, Demo with Sandeep Singh
Tool Talk: Unredacter
asminject.py: Compromise Trusted Linux Processes and Containers
Vinnie Liu: A Life in the Offensive Security Trenches
Ransomware Scenario Emulation Report with Illumio
Watch a Special Livestream From DEF CON 30
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.