Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 107

BloodHound

What is BloodHound?

BloodHoundAn open-source tool that uses graph theory to map and analyze Active Directory and Azure AD attack paths to high-value targets like Domain Admin.


BloodHound is an open-source attack-path analysis tool created by Andy Robbins, Will Schroeder, and Rohan Vazarkar, and now maintained by SpecterOps. A collector (SharpHound or AzureHound) gathers users, groups, sessions, ACLs, and trust relationships from Active Directory and Entra ID, then the BloodHound UI renders them as a Neo4j graph that highlights the shortest path from any compromised principal to high-value assets. Red teams use it for privilege-escalation planning, while blue teams use the same graphs to prioritize hardening (Tier 0, ACL pruning, group-membership reductions). Collection requires read access to the directory and is noisy enough to be detectable.

Examples

  1. 01

    Visualizing the shortest path from a help-desk user to Domain Admin via group nesting.

  2. 02

    Blue team using BloodHound to remove unused DCSync rights from legacy service accounts.

Frequently asked questions

What is BloodHound?

An open-source tool that uses graph theory to map and analyze Active Directory and Azure AD attack paths to high-value targets like Domain Admin. It belongs to the Defense & Operations category of cybersecurity.

What does BloodHound mean?

An open-source tool that uses graph theory to map and analyze Active Directory and Azure AD attack paths to high-value targets like Domain Admin.

How does BloodHound work?

BloodHound is an open-source attack-path analysis tool created by Andy Robbins, Will Schroeder, and Rohan Vazarkar, and now maintained by SpecterOps. A collector (SharpHound or AzureHound) gathers users, groups, sessions, ACLs, and trust relationships from Active Directory and Entra ID, then the BloodHound UI renders them as a Neo4j graph that highlights the shortest path from any compromised principal to high-value assets. Red teams use it for privilege-escalation planning, while blue teams use the same graphs to prioritize hardening (Tier 0, ACL pruning, group-membership reductions). Collection requires read access to the directory and is noisy enough to be detectable.

How do you defend against BloodHound?

Defences for BloodHound typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for BloodHound?

Common alternative names include: BloodHound CE, BloodHound Enterprise.

Related terms

See also