EN
ENNA

BloodHound

FeaturedApache-2.0

💥 Exploitation · Go

BloodHound uses graph theory to reveal hidden and often unintended relationships within an Active Directory or Azure environment. Attackers use BloodHound to identify complex attack paths that would otherwise be impossible to identify. Defenders use it to identify and eliminate those same attack paths. Both red and blue teams can use BloodHound to gain a deeper understanding of privilege relationships in Active Directory environments.

2.9kstars
306forks
102issues
Updated today

Use Cases

  • Active Directory attack path visualization
  • Privilege escalation path discovery
  • Security posture assessment for AD environments
  • Kerberos delegation and trust analysis
  • Blue team hardening of AD permissions

Tags

active-directorygraphprivilege-escalationattack-path

More in Exploitation