BloodHound Community Edition Wiki Page - byt3n33dl3/BloodHound GitHub Wiki
Prioritize, and Eliminate Attack Paths in Active Directory
Get started mapping Attack Paths in Active Directory and Azure today for free with open source BloodHound. Understand the features in BloodHound Enterprise built for defenders and Identity teams to continuously monitor, prioritize and eliminate Attack Paths.
It uses graph theory to reveal the hidden and often unintended relationships within an Active Directory, Entra and Azure environment. Attackers can use BloodHound to easily identify highly complex Attack Paths that would otherwise be impossible to identify quickly, and defenders can use BloodHound to identify and eliminate those same Attack Paths. BloodHound helps blue and red teams better understand privileged relationships in an Active Directory, Entra, and Azure environments.
Quickly map and visualize complex attack paths using BloodHound powerful graph traversal and layout algorithms. Identify critical attack paths and other security risks in a fraction of the time traditional methods take.