Skip to main content
Attack Paths For All

(b:BloodHoundUsers) - [h:Think_In] -> (e:Graphs)

Get started

Get Started

Learn about BloodHound, how to get started, and its security boundaries.

Install a Data Collector

Deploy SharpHound Enterprise or AzureHound Enterprise to collect and upload data for processing and analysis.

Collect Data

Learn how attack path data collection and ingestion works, and how to run attack path data collections.

Analyze Attack Path Data

Analyzing ingested BloodHound data, and identify and remediate attack paths and risks.

OpenGraph

Ingest any data source and map Attack Paths. Learn about the schema, custom icons and more.

Manage BloodHound

Manage a BloodHound instance and its related components, such as users, roles, authentication, collector status, and general security.

API & Integrations

Build with BloodHound through its REST API and integrations.