BloodHound
FeaturedApache-2.0💥 Exploitation · Go
BloodHound uses graph theory to reveal hidden and often unintended relationships within an Active Directory or Azure environment. Attackers use BloodHound to identify complex attack paths that would otherwise be impossible to identify. Defenders use it to identify and eliminate those same attack paths. Both red and blue teams can use BloodHound to gain a deeper understanding of privilege relationships in Active Directory environments.
Use Cases
- Active Directory attack path visualization
- Privilege escalation path discovery
- Security posture assessment for AD environments
- Kerberos delegation and trust analysis
- Blue team hardening of AD permissions
Tags
Details
- Category
- 💥 Exploitation
- Language
- Go
- Repository
- SpecterOps/BloodHound
- License
- Apache-2.0
Platforms
Alternatives & Comparisons
More in Exploitation
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Evil-WinRM
RubyUltimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.
Sliver
GoOpen-source C2 framework by BishopFox. mTLS, HTTP(S), DNS, WireGuard implants with multi-operator support.