245 shaares
19 private links
19 private links
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths.
Also, Ransomulator: https://github.com/zeronetworks/BloodHound-Tools/tree/main/Ransomulator