ENNAENNA

BloodHound vs PingCastle

GitHub Stats

3.0k
Stars
2.8k
314
Forks
341
100
Issues
56
today
Updated
13d ago
Apache-2.0
License
-
Go
Language
C#

About BloodHound

BloodHound uses graph theory to reveal hidden and often unintended relationships within an Active Directory or Azure environment. Attackers use BloodHound to identify complex attack paths that would otherwise be impossible to identify. Defenders use it to identify and eliminate those same attack paths. Both red and blue teams can use BloodHound to gain a deeper understanding of privilege relationships in Active Directory environments.

About PingCastle

PingCastle performs rapid Active Directory security assessments by analyzing domain configuration, trust relationships, user accounts, group policies, and delegation settings. It produces a comprehensive risk score across four categories: stale objects, privileged accounts, trust relationships, and anomalies. PingCastle identifies password policy weaknesses, dangerous delegations, abandoned admin accounts, SMB signing issues, and dozens of other AD security concerns. Reports are generated as interactive HTML with remediation priorities. It runs without elevated privileges and completes assessments in minutes even on large domains.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐ŸชŸwindows

Tags

Shared

active-directory

BloodHound only

graphprivilege-escalationattack-path

PingCastle only

security-assessmentrisk-scoringdomain-auditmisconfiguration