DotNetRussell / BloodBash
PublicA Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for quick AD enumeration.
BloodBash is a standalone tool that analyzes raw network security data files to detect Active Directory misconfigurations, attack paths, and vulnerabilities like ADCS issues without requiring a database or graphical interface.
How It Works
You learn about a simple tool that helps spot weak spots and attack paths in network security data without fancy setups.
Grab the tool's files from the sharing site to your computer.
Follow easy instructions to get everything ready on your machine so it runs smoothly.
Point the tool to the folder with your network scan files you gathered earlier.
Start the check and watch progress bars as it uncovers vulnerabilities like risky permissions and easy attack routes.
See beautiful tables and highlighted paths showing dangers like weak certificates, roastable accounts, and more.
Run all checks for a complete picture of risks.
Focus on one area like dangerous permissions or delegation tricks.
Export the findings to a file and use them to strengthen security or plan your next moves.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.