Analyze AD attack paths with natural-language queries instead of Cypher.
Visit ProjectBloodHound-MCP is a Model Context Protocol (MCP) Server integration for BloodHound, the industry-standard tool for Active Directory security analysis. It allows security professionals to analyze Active Directory attack paths using natural-language queries instead of Cypher, making complex security analysis more accessible.
To use BloodHound-MCP, follow these steps:
What are the prerequisites for using BloodHound-MCP?
BloodHound 4.x+, Neo4j database, Python 3.8+, and MCP Client.
Is BloodHound-MCP only available for cybersecurity professionals?
While designed for security professionals, anyone with access to AD data can use it.
What makes BloodHound-MCP different from standard BloodHound?
It replaces the need for complex Cypher queries with natural-language questions, making it more accessible.
Is this an official product of the BloodHound team?
No, it's a community-driven integration between BloodHound and MCP.
BloodHound-MCP is a powerful integration that brings the capabilities of Model Context Procotol (MCP) Server to BloodHound, the industry-standard tool for Active Directory security analysis. This integration allows you to analyze BloodHound data using natural language, making complex Active Directory attack path analysis accessible to everyone.
🥇 First-Ever BloodHound AI Integration!
This is the first integration that connects BloodHound with AI through MCP, originally announced here.
BloodHound-MCP combines the power of:
With over 75 specialized tools based on the original BloodHound CE Cypher queries, BloodHound-MCP allows security professionals to:
Join our Telegram channel for updates, tips, and discussion:
Clone this repository:
git clone https://github.com/your-username/MCP-BloodHound.git
cd MCP-BloodHound
Install dependencies:
pip install -r requirements.txt
Configure the MCP Server
"mcpServers": {
"BloodHound-MCP": {
"command": "python",
"args": [
"\\BloodHound-MCP.py" ], "env": { "BLOODHOUND_URI": "bolt://localhost:7687", "BLOODHOUND_USERNAME": "neo4j", "BLOODHOUND_PASSWORD": "bloodhoundcommunityedition" } } } ``` ## 🚀 Usage Example queries you can ask through the MCP: - "Show me all paths from kerberoastable users to Domain Admins" - "Find computers where Domain Users have local admin rights" - "Identify Domain Controllers vulnerable to NTLM relay attacks" - "Map all Active Directory certificate services vulnerabilities" - "Generate a comprehensive security report for my domain" - "Find inactive privileged accounts" - "Show me attack paths to high-value targets" ## 🔐 Security Considerations This tool is designed for legitimate security assessment purposes. Always: - Obtain proper authorization before analyzing any Active Directory environment - Handle BloodHound data as sensitive information - Follow responsible disclosure practices for any vulnerabilities discovered ## 📜 License This project is licensed under the MIT License - see the LICENSE file for details. ## 🙏 Acknowledgments - The BloodHound team for creating an amazing Active Directory security tool - The security community for continuously advancing AD security practices [](https://mseep.ai/app/09d13f50-8965-4ebf-b4bf-d6bb98e8f092) --- *Note: This is not an official Anthropic product. BloodHound-MCP is a community-driven integration between BloodHound and MCP.*