BloodHound MCP Server by mwnickerson
47 score
Enables security professionals to query and analyze Active Directory attack paths from BloodHound Community Edition data using natural language through Claude Desktop's Model Context Protocol interface.
Ranked #1529 out of 5463 indexed tools.Actively maintained with commits in the last week.
Is this your tool? Claim this listing to add maintainer context, get a verified badge, and unlock analytics.
Claim listing → Signal Breakdown
Installs 0
Freshness 5d ago
Issue Health 100%
Stars 73
Platform Breadth 1 platform
Contributors 5
Description Detailed
How to Improve
Platforms medium impact
Supported Platforms
From the README
# BloodHound MCP A Model Context Protocol (MCP) server that connects LLMs to BloodHound Community Edition. Ask questions in natural language, get attack path analysis, run Cypher queries, and explore Active Directory, Azure/Entra ID, and OpenGraph environments — all from your AI assistant. ## Demo [Watch the demonstration video](https://youtu.be/eZBT0Iw9CMA) *(updated demo coming soon)* --- ## How It Works The server exposes BloodHound CE's REST API and Neo4j graph through a set of **11 composite MCP tools**, **10 reference resources**, and a **system prompt** tuned for offensive security analysis. ### Composite Tools Each tool uses an `info_type` parameter to select what data is returned, keeping the tool surface small and token-efficient: | Tool | `info_type` Options | |------|---------------------| | `domain_info` | `list`, `info`, `users`, `groups`, `computers`, `ous`, `gpos`, `dc_syncers`, `foreign_admins`, `foreign_group_members`, `linked_gpos`, `search` | | `user_info`Read full README on GitHub →