Wed. Aug 10th, 2022

Attackers think in graphs, defenders think in actions,

Documentation

All documentation can be found in the wiki

Acknowledgments

  • The py2neo project which makes this possible.
  • The PlumHound project which gave me the idea of creating something similar which suited my needs.
  • The aclpwn for the idea around exploit cost.
  • The Bloodhound Gang Slack channel for Cypher help.
  • The BloodHound project for changing the world and for continuing their support for the Open-Source community even when having a commercial offering.
Download GoodHound

If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.

Discord

Original Source