-
Notifications
You must be signed in to change notification settings - Fork 119
Home
BloodHound CE is a security tool that uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Entra ID (formerly known as Azure AD) environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory or Azure environment.
If you're visiting this wiki as a BloodHound user, we highly recommend checking out our official documentation. These pages hold a wealth of knowledge around setup, usage, and best practices for BloodHound CE and Enterprise, as most information is interchangeable between the two versions.
If the docs still didn't have an answer then feel free to reach out to us or the Community for help. You can check out the Contact page for more information.
The easiest way to get up and running is to use our pre-configured Docker Compose setup. The following steps will get BloodHound CE up and running with the least amount of effort.
- Install Docker Compose
- Run
curl https://raw.githubusercontent.com/SpecterOps/bloodhound/main/examples/docker-compose/docker-compose.yml | docker compose -f - up
- Locate the randomly generated password in the terminal output of Docker Compose
- In a browser, navigate to
http://localhost:8080/ui/login
. Login with a username ofadmin
and the randomly generated password from the logs
Details on setting up the BloodHound CE development environment and contributing code can be found on the [Development page](TODO: Link to development wiki).