bloodhound-python
TLDR
Collect all Active Directory data
SYNOPSIS
bloodhound-python [options]
DESCRIPTION
bloodhound-python is a Python-based ingestor for BloodHound, an Active Directory security analysis tool. It collects information about AD objects (users, computers, groups) and their relationships, outputting JSON files for import into the BloodHound graph database.
The tool uses graph theory to identify attack paths in Active Directory environments that would be difficult to detect manually, helping both attackers and defenders understand domain security.
PARAMETERS
-d, --domain domain
Target Active Directory domain-u, --username user
Username for authentication-p, --password pass
Password for authentication--hashes LM:NT
NTLM hash for pass-the-hash authentication-ns, --nameserver ip
DNS server/Domain Controller IP address-c, --collectionmethod method
Collection methods: all, users, groups, computers, trusts, sessions, acl, objectprops-k, --kerberos
Use Kerberos authentication--zip
Compress output to a zip file-o, --outputdir dir
Output directory for JSON files--dns-tcp
Use TCP for DNS queries-v
Enable verbose output
CAVEATS
Requires valid domain credentials. Some collection methods (like sessions) require specific privileges. Output is compatible with BloodHound 4.1+. Use responsibly and only on systems you have authorization to test.
HISTORY
BloodHound was created by @_wald0, @CptJesus, and @harmj0y at SpecterOps, released in 2016. The Python ingestor (bloodhound-python) was developed by Dirk-jan Mollema as a cross-platform alternative to the C# SharpHound collector.
SEE ALSO
ldapsearch(1), impacket(1), crackmapexec(1)


