Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Customer Story

John Deere Digital Security Journey: Securing Products Against Cyberattacks

To help ensure John Deere products are ready to withstand security threats, John Deere chooses Bishop Fox's Cosmos platform and product security reviews.

Webcast

Hacker Insights Revealed: Explore New SANS Survey Results

In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.

Guide

Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools

What’s better than a Top 10 List? An ultimate guide of all our favorite lists – from red team and cloud penetration tools TO our favorite music to hack to and the best reads for your offensive security journey. We’ve got you covered to level up your penetration testing game with this comprehensive guide of hacking goodies.

Methodology

Bishop Fox Red Team Methodology

This Red Team methodology document provides an overview of Bishop Fox's approach to Red Team engagements.

Webcast

Tool Talk: asminject.py

Watch as we explore Bishop Fox’s very own asminject.py, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.

Webcast

Livestream: Bridging the Gap Between Military and Civilian Work

Tune into our livestream session to hear Skillbridge cybersecurity success stories.

Inside the Mind of Modern Adversaries

SANS, in partnership with Bishop Fox, surveyed 280 ethical hackers to gain insight into the mind and methods of modern adversaries – including what works and what doesn’t. Here are our preliminary findings.

Webcast

Tool Talk: CloudFox

Watch as we explore Bishop Fox’s very own CloudFox, a command line tool that helps offensive security practitioners navigate unfamiliar cloud environments and find exploitable attack paths in cloud infrastructure. Tune in to our livestream for a demo of CloudFox!

Methodology

Bishop Fox Cloud Penetration Testing Methodology

Overview of Bishop Fox’s methodology for cloud security reviews.

Webcast

The Mind Behind Nuclei, Demo with Sandeep Singh

Join co-founder of ProjectDiscovery, Sandeep Singh, for a demo of the new Nuclei tool.

Webcast

Tool Talk: Unredacter

In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.

Guide

asminject.py: Compromise Trusted Linux Processes and Containers

This step-by-step technical guide highlights the capabilities of asminject.py, a code injection tool used to compromise Linux processes and containers.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.