BloodHound logo and interface preview
Active Directory SecurityFree (Enterprise available)

BloodHound Review 2026

Active Directory attack path analysis and visualization

BloodHound's graph-based approach to AD security reveals attack paths invisible to traditional tools, making it essential for both offensive and defensive AD assessments.

About BloodHound - Active Directory Security

BloodHound is a powerful Active Directory (AD) reconnaissance and attack path analysis tool. It uses graph theory to visualize the complex relationships and permissions within AD environments, revealing hidden attack paths that traditional tools miss.

The tool collects data using SharpHound (C# ingestor) or AzureHound (for Azure AD) and stores it in a Neo4j graph database. Security teams can then query this data to find shortest paths to Domain Admin, identify dangerous permissions, and analyze object control relationships. Both red teams and blue teams use BloodHound to understand and secure AD attack surfaces.

About SpecterOps

BloodHound was originally created by Rohan Vazarkar, Will Schroeder, and Andy Robbins at SpecterOps. It is now maintained by the BloodHound team with both open-source and commercial offerings.

Founded: 2016HQ: Remote / SpecterOps

What Makes BloodHound Different?

  • Graph-based attack path visualization
  • Identifies shortest paths to Domain Admin
  • Reveals hidden permission relationships
  • Supports both on-prem AD and Azure AD
  • Free and open-source

Why Choose BloodHound?

🎯

Visibility

See the AD attack surface from an attacker's perspective with interactive graph visualization

Efficiency

Find the most efficient attack paths to high-value targets automatically

🛡️

Defense

Blue teams use the same data to identify and remediate dangerous permissions

Who is BloodHound Best For?

Red teamers
AD security assessors
Blue teamers
Identity security teams

BloodHound Key Features

  • Graph-based AD visualization
  • Shortest path analysis to Domain Admin
  • SharpHound data collector
  • AzureHound for Azure AD
  • Custom Cypher queries
  • Pre-built attack path queries
  • Exportable reports and paths
  • Integration with Neo4j Bloom

Use Cases for BloodHound

Red Team Assessments

Identify and exploit the most efficient attack paths to achieve domain compromise.

AD Security Audits

Assess the security posture of Active Directory by revealing dangerous permissions and misconfigurations.

Permission Remediation

Blue teams use BloodHound findings to systematically remove unnecessary permissions and reduce attack surface.

Implementation Timeline

⏱️ 30-60 minutes

BloodHound requires Neo4j database and the BloodHound GUI. SharpHound is run on a domain-joined Windows machine to collect data. AzureHound collects Azure AD data. Setup takes 30-60 minutes including Neo4j installation.

BloodHound Pros & Cons

Pros

  • Unique graph visualization
  • Reveals hidden attack paths
  • Active community
  • Both red and blue team utility

Cons

  • Requires Neo4j knowledge
  • Collection can trigger alerts
  • Complex AD environments produce overwhelming graphs

Pricing Details

💰Free (Enterprise available)

BloodHound Community Edition is free and open-source. BloodHound Enterprise is a commercial offering with continuous monitoring and remediation guidance.

Still Deciding on the Right Tool?

Compare BloodHound with other Active Directory Security solutions side-by-side