Discover offensive security resources ranging from reports and guides to our latest webcasts and livestreams.
Penetrating the Cloud: Uncovering Unknown Vulnerabilities
Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks
How Attackers Slip Past EDR: A Live Look at LoLBins in Action
CVE Spotlight: Breaking Down Zimbra’s RCE Vulnerabilities
Spoofy in Action: Advancing Domain Spoofing Detection
Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams
Looking Toward the Cosmos: Making the Case for Continuous Offensive Security
John Deere Digital Security Journey: Securing Products Against Cyberattacks
Hacker Insights Revealed: Explore New SANS Survey Results
Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools
Bishop Fox Red Team Methodology
Process Injection on Linux: A Deep Dive into asminject.py
Bridging the Gap Between Military and Civilian Work
CloudFox in Action: Mapping Exploitable Paths in AWS
Bishop Fox Cloud Penetration Testing Methodology
The Mind Behind Nuclei, Demo with Sandeep Singh
Tool Talk: Unredacter
asminject.py: Compromise Trusted Linux Processes and Containers
Vinnie Liu: A Life in the Offensive Security Trenches
Ransomware Scenario Emulation Report with Illumio
Watch a Special Livestream From DEF CON 30
Leveraging Nuclei for Scalable, Custom Vulnerability Scanning
CISO Stories featuring Will Lin, Founding Team Member at ForgePoint Capital
CyberRisk Alliance Cloud Adoption Security Report
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.