BloodHound
FeaturedApache-2.0๐ฅ Exploitation ยท Go
BloodHound uses graph theory to reveal hidden and often unintended relationships within an Active Directory or Azure environment. Attackers use BloodHound to identify complex attack paths that would otherwise be impossible to identify. Defenders use it to identify and eliminate those same attack paths. Both red and blue teams can use BloodHound to gain a deeper understanding of privilege relationships in Active Directory environments.
Use Cases
- Active Directory attack path visualization
- Privilege escalation path discovery
- Security posture assessment for AD environments
- Kerberos delegation and trust analysis
- Blue team hardening of AD permissions
Tags
Details
- Category
- ๐ฅ Exploitation
- Language
- Go
- Repository
- SpecterOps/BloodHound
- License
- Apache-2.0
- Platforms
- ๐งlinux๐macos๐ชwindows
Links
Used in 1 Workflow
Community Reviews
Alternatives & Comparisons
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
Compare BloodHound vs ImpacketCrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Compare BloodHound vs CrackMapExecMore in Exploitation
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Evil-WinRM
RubyUltimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.
Sliver
GoOpen-source C2 framework by BishopFox. mTLS, HTTP(S), DNS, WireGuard implants with multi-operator support.