Introducing
Continuous Attack Surface Testing (CAST)
Tackling the Changed
ENTERPRISE SECURITY LANDSCAPE
SONOS MAKES SECURE MOVES
WITH BISHOP FOX
WE UNCOVER YOUR RISKS
SO YOU CAN COVER YOUR ASSETS
Is This IoT App Safe to Drink?
We can’t slow the Internet of Things down, but we can work to improve its security. Learn how IoT legislation is moving these devices toward safer products with more transparent security features.
Read the blogWith you for
the long haul
help you improve your security posture by
revealing your risks and requirements. And we keep our word by delivering exactly what we promise.
We listen
We take the time to understand the nuances of your business, your pain points, and your security goals to craft a solution that defines success on your terms.
We deliver
Impact comes from knowing exactly where you’re exploitable, so we report only on vulnerabilities we can verify. You won’t just know what’s possible; you’ll know what’s real.
We guarantee
When we promise senior talent, that’s what we deliver. We work with you to identify the team that has the experience and knowledge to tackle your unique testing needs.
“Companies come to Bishop Fox because they want to stay ahead of the bad guys, not because they are checking a box.”
— Will Lin, Partner at ForgePoint Capital
Customer
Stories
Our clients are as committed to security as we are. See how we’ve partnered with leading companies across all industries to assess, identify, and minimize their security risks.
Stay Ahead
Of the Risks
Managed
Services
Amplify your offensive security program and stay ahead of the bad guys with attack surface discovery, sophisticated testing automation, and expert-driven penetration tests.
Consulting
Services
All-out digital assaults. Penetration tests of applications and networks. Cloud, product, and device security reviews. And custom engagements designed to meet your specific testing needs, whatever they are. We do it all.
Our research
Is your opportunity
Hacker Tools: Dufflebag
Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally left in.
Hacker Tools: RMIScout
RMIScout performs wordlist and brute-force attacks against exposed Java RMI interfaces to safely guess method signatures without invocation.
Hacker Tools: GitGot
GitGot is a semi-automated, feedback-driven tool to empower users to rapidly search through troves of public data on GitHub for sensitive secrets.
Hacker Tools: Eyeballer
AI-powered, open source tool designed to help penetration testers assess large-scale external perimeters.
Hacker Tools: GadgetProbe
GadgetProbe is a tool to probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on a remote Java classpath.
Sliver Framework
Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. A free alternative to Cobalt Strike.
Let’s
Talk
Whether you know exactly which services you need, or want help in figuring out what solution is best for you, we can help.