Map Active Directory attack paths. Find the shortest route to Domain Admin. Visualize ACL abuse opportunities and privilege escalation chains.
Graph-driven Active Directory attack path analysis. Use it to see your environment the way attackers do—and then dismantle those paths.
BloodHound uses graph theory to reveal hidden attack paths in Active Directory. Red teams use it to find the shortest path to Domain Admin; blue teams use it to eliminate those paths before attackers do.
Ready to Enumerate
OPSEC: Authorized Assessments Only
BloodHound is a powerful AD enumeration tool used by both red teams and attackers. Only use in authorized penetration tests. Implement tiered administration, limit privileged sessions, and monitor for LDAP enumeration anomalies.