ENNAENNA

BloodHound

FeaturedApache-2.0

๐Ÿ’ฅ Exploitation ยท Go

BloodHound uses graph theory to reveal hidden and often unintended relationships within an Active Directory or Azure environment. Attackers use BloodHound to identify complex attack paths that would otherwise be impossible to identify. Defenders use it to identify and eliminate those same attack paths. Both red and blue teams can use BloodHound to gain a deeper understanding of privilege relationships in Active Directory environments.

3.0kstars
314forks
100issues
Updated 15d ago

Use Cases

  • Active Directory attack path visualization
  • Privilege escalation path discovery
  • Security posture assessment for AD environments
  • Kerberos delegation and trust analysis
  • Blue team hardening of AD permissions

Tags

active-directorygraphprivilege-escalationattack-path

Community Reviews

More in Exploitation