bloodhound.com
bloodhound.com logo

BloodHound

Integrates with BloodHound security tool to analyze Active Directory and Azure environments for attack paths, privilege...

Created byApr 22, 2025

BloodHound-MCP

BloodHound-MCP

Model Context Protocol (MCP) Server for BloodHound

BloodHound-MCP is a powerful integration that brings the capabilities of Model Context Procotol (MCP) Server to BloodHound, the industry-standard tool for Active Directory security analysis. This integration allows you to analyze BloodHound data using natural language, making complex Active Directory attack path analysis accessible to everyone.
First-Ever BloodHound AI Integration!This is the first integration that connects BloodHound with AI through MCP, originally announced here.

What is BloodHound-MCP?

BloodHound-MCP combines the power of:
  • BloodHound: Industry-standard tool for visualizing and analyzing Active Directory attack paths
  • Model Context Protocol (MCP): An open protocol for creating custom AI tools, compatible with various AI models
  • Neo4j: Graph database used by BloodHound to store AD relationship data
With over 75 specialized tools based on the original BloodHound CE Cypher queries, BloodHound-MCP allows security professionals to:
  • Query BloodHound data using natural language
  • Discover complex attack paths in Active Directory environments
  • Assess Active Directory security posture more efficiently
  • Generate detailed security reports for stakeholders

Community

Join our Telegram channel for updates, tips, and discussion:

Star History

Features

  • Natural Language Interface: Query BloodHound data using plain English
  • Comprehensive Analysis Categories:

Prerequisites

  • BloodHound 4.x+ with data collected from an Active Directory environment
  • Neo4j database with BloodHound data loaded
  • Python 3.8 or higher
  • MCP Client

Installation

  1. Clone this repository:
  1. Install dependencies:
  1. Configure the MCP Server

Usage

Example queries you can ask through the MCP:
  • "Show me all paths from kerberoastable users to Domain Admins"
  • "Find computers where Domain Users have local admin rights"
  • "Identify Domain Controllers vulnerable to NTLM relay attacks"
  • "Map all Active Directory certificate services vulnerabilities"
  • "Generate a comprehensive security report for my domain"
  • "Find inactive privileged accounts"
  • "Show me attack paths to high-value targets"

Security Considerations

This tool is designed for legitimate security assessment purposes. Always:
  • Obtain proper authorization before analyzing any Active Directory environment
  • Handle BloodHound data as sensitive information
  • Follow responsible disclosure practices for any vulnerabilities discovered

License

This project is licensed under the MIT License - see the LICENSE file for details.

Acknowledgments

  • The BloodHound team for creating an amazing Active Directory security tool
  • The security community for continuously advancing AD security practices

Note: This is not an official Anthropic product. BloodHound-MCP is a community-driven integration between BloodHound and MCP.

BloodHound-MCP

BloodHound-MCP

Model Context Protocol (MCP) Server for BloodHound

BloodHound-MCP is a powerful integration that brings the capabilities of Model Context Procotol (MCP) Server to BloodHound, the industry-standard tool for Active Directory security analysis. This integration allows you to analyze BloodHound data using natural language, making complex Active Directory attack path analysis accessible to everyone.
First-Ever BloodHound AI Integration!This is the first integration that connects BloodHound with AI through MCP, originally announced here.

What is BloodHound-MCP?

BloodHound-MCP combines the power of:
  • BloodHound: Industry-standard tool for visualizing and analyzing Active Directory attack paths
  • Model Context Protocol (MCP): An open protocol for creating custom AI tools, compatible with various AI models
  • Neo4j: Graph database used by BloodHound to store AD relationship data
With over 75 specialized tools based on the original BloodHound CE Cypher queries, BloodHound-MCP allows security professionals to:
  • Query BloodHound data using natural language
  • Discover complex attack paths in Active Directory environments
  • Assess Active Directory security posture more efficiently
  • Generate detailed security reports for stakeholders

Community

Join our Telegram channel for updates, tips, and discussion:

Star History

Features

  • Natural Language Interface: Query BloodHound data using plain English
  • Comprehensive Analysis Categories:

Prerequisites

  • BloodHound 4.x+ with data collected from an Active Directory environment
  • Neo4j database with BloodHound data loaded
  • Python 3.8 or higher
  • MCP Client

Installation

  1. Clone this repository:
  1. Install dependencies:
  1. Configure the MCP Server

Usage

Example queries you can ask through the MCP:
  • "Show me all paths from kerberoastable users to Domain Admins"
  • "Find computers where Domain Users have local admin rights"
  • "Identify Domain Controllers vulnerable to NTLM relay attacks"
  • "Map all Active Directory certificate services vulnerabilities"
  • "Generate a comprehensive security report for my domain"
  • "Find inactive privileged accounts"
  • "Show me attack paths to high-value targets"

Security Considerations

This tool is designed for legitimate security assessment purposes. Always:
  • Obtain proper authorization before analyzing any Active Directory environment
  • Handle BloodHound data as sensitive information
  • Follow responsible disclosure practices for any vulnerabilities discovered

License

This project is licensed under the MIT License - see the LICENSE file for details.

Acknowledgments

  • The BloodHound team for creating an amazing Active Directory security tool
  • The security community for continuously advancing AD security practices

Note: This is not an official Anthropic product. BloodHound-MCP is a community-driven integration between BloodHound and MCP.