BloodHound Legacy: Deprecated Active Directory Attack Path Tool
Deprecated Active Directory security tool that used graph theory to identify attack paths. Replaced by BloodHound CE.
Learn more about BloodHound Legacy
BloodHound Legacy is a deprecated security analysis tool that mapped Active Directory environments to identify potential attack paths and privilege escalation routes. The tool used graph theory algorithms to analyze relationships between users, groups, computers, and permissions within Windows domains. It consisted of data collection components (ingestors) that gathered information from Active Directory and a graph-based visualization interface for analyzing the results. Security professionals used it for penetration testing, red team exercises, and identifying misconfigurations in Active Directory deployments.
Graph Theory Analysis
Applied graph algorithms to Active Directory data to reveal hidden relationships and attack paths between domain objects.
Visual Path Mapping
Provided interactive graph visualizations showing potential routes from standard users to domain administrator privileges.
Automated Data Collection
Included ingestor tools that automatically gathered Active Directory relationship data without requiring elevated privileges.
Adding abuse guidance from UNIX-like hosts and various bug fixes
- –Adding abuse guidance from UNIX-like hosts
- –Fix typo: whisper → whisker
- –Update wording to "acceptable" terms
- –Fix wrong statements in Azure post processing setGlobalAdminHighValue & setPrivRoleAdminHighValue
- –Fix edgeIncluded label partially clickable
Bug fixes and Azure primitives support improvements
- –Fix typo in toUpperCase
- –Changed the run command
- –Install latest instead of 4.0 Neo4j for Linux
- –Fix AZResetPassword false positives
- –Add support for new azure primitives
BloodHound 4.2.0 - Azure Refactor
- –AzureHound has been rewritten from the ground up and is 1000% more AWESOME
- –New edges: DCSync, SyncLAPSPassword, and a ton of Azure edges
- –New post-processing logic
- –Security fixes
- –Az help modals
Related Repositories
Discover similar tools and frameworks used by developers
DVWA
PHP/MariaDB training platform for web security exploitation practice.
CyberChef
Browser-based data transformation tool with chainable operations.
Nuclei
Template-based multi-protocol security scanner for CI/CD pipelines.
Volatility Framework
Open-source Python framework for extracting digital artifacts from RAM samples for Windows, Linux, and macOS forensics.
Prowler
Cloud security platform automating assessments and compliance across AWS, Azure, GCP, and K8s.