EN
ENNA

BloodHound vs CrackMapExec

GitHub Stats

2.9k
Stars
9.1k
310
Forks
1.7k
97
Issues
67
2d ago
Updated
2y ago
Apache-2.0
License
BSD-2-Clause
Go
Language
Python

About BloodHound

BloodHound uses graph theory to reveal hidden and often unintended relationships within an Active Directory or Azure environment. Attackers use BloodHound to identify complex attack paths that would otherwise be impossible to identify. Defenders use it to identify and eliminate those same attack paths. Both red and blue teams can use BloodHound to gain a deeper understanding of privilege relationships in Active Directory environments.

About CrackMapExec

CrackMapExec is a versatile tool for pentesting Active Directory environments, offering capabilities for SMB, LDAP, MSSQL, and WinRM enumeration and exploitation. It facilitates lateral movement and credential spraying attacks while providing a comprehensive interface for testing domain credentials and configurations. Written in Python, it is favored by security professionals for its integration with offensive security operations, allowing for efficient discovery and exploitation of network vulnerabilities.

Platform Support

🐧linux🍎macos🪟windows
🐧linux🍎macos

Tags

Shared

active-directory

BloodHound only

graphprivilege-escalationattack-path

CrackMapExec only

smblateral-movementcredential-spraying