BloodHound-MCP-AI
by MorDavid·★ 353·Score 47
MCP server connecting BloodHound with AI for natural language Active Directory security analysis.
Overview
BloodHound-MCP-AI is an integration that connects BloodHound with AI through Model Context Protocol, enabling security professionals to analyze Active Directory attack paths using natural language instead of complex Cypher queries. With over 75 specialized tools based on original BloodHound CE Cypher queries, this server allows querying BloodHound data using plain English, discovering complex attack paths, assessing AD security posture, and generating detailed security reports for stakeholders.
Try asking AI
After installing, here are 6 things you can ask your AI assistant:
When to choose this
Choose this if you're a security professional already using BloodHound who wants to analyze AD attack paths through natural language queries without learning Cypher.
When NOT to choose this
Don't choose this if you need real-time Active Directory analysis (this only works with collected data) or if you don't already have BloodHound data available.
Tools this server exposes
6 tools extracted from the READMEfind_attack_pathsFinds attack paths in Active Directory
identify_vulnerable_domain_controllersIdentifies Domain Controllers vulnerable to NTLM relay attacks
map_certificate_services_vulnerabilitiesMaps Active Directory certificate services vulnerabilities
generate_security_reportGenerates comprehensive security reports for Active Directory
find_inactive_privileged_accountsFinds inactive privileged accounts in Active Directory
map_attack_paths_to_high_value_targetsShows attack paths to high-value targets in Active Directory
Note: Tool names inferred from example queries in the Usage section, as no explicit tool list was provided in the README.
Comparable tools
Installation
Installation
- Clone this repository:
``bash git clone https://github.com/MorDavid/BloodHound-MCP-AI.git cd BloodHound-MCP-AI ``
- Install dependencies:
``bash pip install -r requirements.txt ``
- Configure the MCP Server in Claude Desktop:
```json { "mcpServers": { "BloodHound-MCP": { "command": "python", "args": [ "<Your_Path>\\BloodHound-MCP.py" ], "env": { "BLOODHOUND_URI": "bolt://localhost:7687", "BLOODHOUND_USERNAME": "neo4j", "BLOODHOUND_PASSWORD": "bloodhoundcommunityedition" } } } }
FAQ
- What is BloodHound-MCP?
- BloodHound-MCP is an integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language instead of complex Cypher queries.
- What are the prerequisites for using BloodHound-MCP?
- You need BloodHound 4.x+ with data collected from an Active Directory environment, Neo4j database with BloodHound data loaded, Python 3.8 or higher, and an MCP Client.
- What kind of queries can I perform with BloodHound-MCP?
- You can perform queries such as 'Show me all paths from kerberoastable users to Domain Admins', 'Find computers where Domain Users have local admin rights', 'Identify Domain Controllers vulnerable to NTLM relay attacks', and many others related to Active Directory security analysis.
Compare BloodHound-MCP-AI with
Last updated · Auto-generated from public README + GitHub signals.