Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management. Read the Report ›

Bishop Fox Labs

Collaborative Analysis. Real-World Impact.

Our offensive security experts are dedicated to finding creative solutions to difficult security problems and then sharing that information freely. 

We believe the only way to advance the state of security is to collaborate with the broader community, and we do our best to contribute tools, research, and knowledge that can improve the security and privacy of data and systems. We hope our work has real impact on real lives. It's what inspires us every day.

Driven by Mission & Vision

We're committed to innovation and openly sharing information.

News Insights

Hear from our security experts on the latest happenings in the news from regulation updates to hacks around the world.

Vulnerability Intelligence

Get in-depth insights into the latest vulnerabilities found and explored by our offensive security experts.

Security Advisories

Dive into the latest security bulletins and advisories curated by our expert team at Bishop Fox, encapsulating cutting-edge insights into the rapidly evolving cybersecurity landscape.

Hacking Tools

Augment your cybersecurity capabilities with an arsenal of tools and cutting-edge research, meticulously developed by Bishop Fox's team of seasoned, expert professionals.

Training Sessions

Watch our training sessions to expand your continued education and give you a leg-up against threat actors in your hacking endeavors.

Technical Guides

Download our detailed technical guides for an advanced look at frameworks, tools, and more.

left

Expert-driven insights into the latest happenings

News Insights

Interview-style video recordings highlighting one individual that answers a question or discusses a relevant cybersecurity news topic. The goal is to showcase BF thought leadership on newsworthy topics on our website and across our social media channels.

left

In-Depth Findings

Vulnerability Intelligence

Insights include the origins and technical components of the vulnerability, how pen testers can find and exploit the vulnerability, and the relative business impact the vulnerability can have on an organization.

left

Responsible Disclosure Program

Security Advisories

We're proud to participate in Responsible Disclosures, where we expose vulnerabilities identified by Foxes in the course of company-sponsored research or during client engagements.

Training session title: Swagger Jacker Training about improved auditing of OpenAPI Definition Files with the headshot os security consultant Tony West, a Bishop Fox adversarial operator.

LIVE ON YOUTUBE, LINKEDIN, TWITTER

New Tool: Swagger Jacker, Improving Auditing of OpenAPI Definition Files

Discover the power of Swagger Jacker, an open-source audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files for penetration testers.

Try Popular Tools from Bishop Fox

A Hacker's Tool Kit

Swagger Jacker

Improve auditing of OpenAPI definition files.

Swagger Jacker is an audit tool designed to improve inspection of unintentionally exposed OpenAPI definition files.

ASMINJECT.PY

Compromise Linux-trusted processes to capture sensitive data.

asminject.py is a code injection tool that compromises Linux-trusted processes and containers.

CloudFox

Find exploitable attack paths in cloud infrastructure.

CloudFox is a command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure. It currently supports AWS.

left

Learn from the Experts

Training Sessions

Catch our training sessions whether they are livestreams showcasing how to use Bishop Fox's elite open-source tools, in-depth Discord workshops, or interviews of security influencers and leaders at major conferences like RSA and DEF CON.

left

Written For Security Practitioners

Technical Guides

Unlock the secrets of cybersecurity with our in-depth technical guides. Delve into advanced frameworks, explore cutting-edge tools, and elevate your digital defenses.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.