Name: Bishop Fox
Type: Organization
Bio: The leader in offensive security, providing continuous pen testing, red teaming, attack surface management, and traditional security assessments.
Twitter: bishopfox
Blog: https://bishopfox.com
Bishop Fox's Projects
Bishop Fox Engineering
READONLY: Auto-generated mirror for https://github.com/marvinpinto/actions/tree/master/packages/automatic-releases
📦 :octocat: GitHub Action for creating GitHub Releases
A GitHub action used to zip file contents
Anti-Anti-Automation Framework
Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86-64, x86, and ARM32 Linux processes without the use of ptrace by accessing /proc/<pid>/mem. Useful for certain post-exploitation scenarios, recovering content from process memory, etc..
The AWS EKS Accelerator for Terraform is a framework designed to help deploy and operate secure multi-account, multi-region AWS environments. The power of the solution is the configuration file which enables the users to provide a unique terraform state for each cluster and manage multiple clusters from one repository. This code base allows users to deploy EKS add-ons using Helm charts.
CLI that allows user to submit http requests using AWS request signing
Go module that returns supported regions for a service or supported services for a region
A collection of manifests that will create pods with elevated privileges.
Utility to decrypt App Store apps on jailbroken iOS 11.x
Dylib injection for iOS 11.0 - 11.1.2 with LiberiOS and Electra jailbreaks
Determine the running software version of a remote F5 BIG-IP management interface.
Scripts to clone CA certificates for use in HTTPS client attacks.
Automating situational awareness for cloud penetration tests.
Create your own vulnerable by design AWS penetration testing playground
Proof of Concept code for CVE-2015-0345 (APSB15-07)
Recovery of Plaintext iMessage Data Without Breaking Crypto
Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing
RCE exploit for CVE-2023-3519
Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762
An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide
PoC code from DEF CON 25 presentation
Docker images for the Selenium Grid Server
Search exposed EBS volumes for secrets
Convolutional neural network for analyzing pentest screenshots