MCP Catalogs
Home

BloodHound-MCP-AI

by MorDavid·353·Score 47

MCP server connecting BloodHound with AI for natural language Active Directory security analysis.

securityknowledge-graphdeveloper-tools
53
Forks
0
Open issues
12 mo ago
Last commit
2d ago
Indexed

Overview

BloodHound-MCP-AI is an integration that connects BloodHound with AI through Model Context Protocol, enabling security professionals to analyze Active Directory attack paths using natural language instead of complex Cypher queries. With over 75 specialized tools based on original BloodHound CE Cypher queries, this server allows querying BloodHound data using plain English, discovering complex attack paths, assessing AD security posture, and generating detailed security reports for stakeholders.

Try asking AI

After installing, here are 6 things you can ask your AI assistant:

you:Visualize and analyze Active Directory attack paths without knowing Cypher queries
you:Assess AD security posture by identifying potential privilege escalation paths
you:Generate comprehensive security reports for stakeholders using natural language
you:What is BloodHound-MCP?
you:What are the prerequisites for using BloodHound-MCP?
you:What kind of queries can I perform with BloodHound-MCP?

When to choose this

Choose this if you're a security professional already using BloodHound who wants to analyze AD attack paths through natural language queries without learning Cypher.

When NOT to choose this

Don't choose this if you need real-time Active Directory analysis (this only works with collected data) or if you don't already have BloodHound data available.

Tools this server exposes

6 tools extracted from the README
  • find_attack_paths

    Finds attack paths in Active Directory

  • identify_vulnerable_domain_controllers

    Identifies Domain Controllers vulnerable to NTLM relay attacks

  • map_certificate_services_vulnerabilities

    Maps Active Directory certificate services vulnerabilities

  • generate_security_report

    Generates comprehensive security reports for Active Directory

  • find_inactive_privileged_accounts

    Finds inactive privileged accounts in Active Directory

  • map_attack_paths_to_high_value_targets

    Shows attack paths to high-value targets in Active Directory

Note: Tool names inferred from example queries in the Usage section, as no explicit tool list was provided in the README.

Comparable tools

adexplorer-mcpldap-mcpbloodhound-cli

Installation

Installation

  1. Clone this repository:

``bash git clone https://github.com/MorDavid/BloodHound-MCP-AI.git cd BloodHound-MCP-AI ``

  1. Install dependencies:

``bash pip install -r requirements.txt ``

  1. Configure the MCP Server in Claude Desktop:

```json { "mcpServers": { "BloodHound-MCP": { "command": "python", "args": [ "<Your_Path>\\BloodHound-MCP.py" ], "env": { "BLOODHOUND_URI": "bolt://localhost:7687", "BLOODHOUND_USERNAME": "neo4j", "BLOODHOUND_PASSWORD": "bloodhoundcommunityedition" } } } }

FAQ

What is BloodHound-MCP?
BloodHound-MCP is an integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language instead of complex Cypher queries.
What are the prerequisites for using BloodHound-MCP?
You need BloodHound 4.x+ with data collected from an Active Directory environment, Neo4j database with BloodHound data loaded, Python 3.8 or higher, and an MCP Client.
What kind of queries can I perform with BloodHound-MCP?
You can perform queries such as 'Show me all paths from kerberoastable users to Domain Admins', 'Find computers where Domain Users have local admin rights', 'Identify Domain Controllers vulnerable to NTLM relay attacks', and many others related to Active Directory security analysis.

Compare BloodHound-MCP-AI with

GitHub →

Last updated · Auto-generated from public README + GitHub signals.