Skip to content

PatxaSec/BloodCLI

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 

Repository files navigation

BloodHound JSON Analyzer

This Python script parses a BloodHound JSON ZIP file and analyzes Active Directory entities and their relationships to identify potential security risks.


Features

  • Parses BloodHound data from a ZIP file containing JSON exports.
  • Detects important entity categories:
    • AdminCount=true accounts
    • Kerberoastable accounts
    • AS-REP Roastable accounts
    • Disabled admins
    • Computers with obsolete operating systems
    • Users with passwords that never expire
  • Displays access relationships (ACLs) between entities.
  • Optional filtering of relationships and entities by name (user, computer, group, container, OU, domain, GPO).
  • Optionally excludes relationships where the destination entity is an admin.
  • Limit output count per category.

Usage

python3 automate_blood.py <path_to_bloodhound_zip> [limit] [-f FILTER] [-a]
usage: automate_blood.py [-h] [-f FILTER_NAME] [-a] zip_path [limit]

Process BloodHound ZIP files and analyze relationships.

positional arguments:
  zip_path             Path to BloodHound ZIP file
  limit                Limit number of displayed items per category (integer or ':')

options:
  -h, --help           show this help message and exit
  -f, --filter FILTER  Filter string for users/computers/groups/containers/OUs/domains/GPOs/rights
  -a, --filter-admin   Exclude relationships where entity is admin
  • limit can be any integer.

  • WITH DEFAULT Full data

imagen

  • With 5 relationships

imagen

  • Excluding relationships where the entity is an admin.

imagen

  • Filtering

imagen

imagen

About

Automatic BloodHound ZIP Parser for CLI

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages