local-only server
The server can only run on the client’s local machine because it depends on local resources.
Integrations
Integrates with Neo4j database to store and query BloodHound data about Active Directory and Azure Active Directory environments, enabling natural language queries for security analysis without writing Cypher queries directly.
BloodHound MCP
BloodHound MCP (Model Context Protocol) is an innovative extension of the BloodHound tool, designed to enable Large Language Models (LLMs) to interact with and analyze Active Directory (AD) and Azure Active Directory (AAD) environments through natural language queries. By leveraging the power of LLMs, BloodHound MCP allows users to perform complex queries and retrieve insights from their AD/AAD environments using simple, conversational commands.
Features
- Natural Language Queries: Use conversational language to query your AD/AAD environment without needing to write Cypher queries manually.
- LLM-Powered Analysis: Harness the capabilities of Large Language Models to interpret and execute queries on your behalf.
- Seamless Integration: Works with existing BloodHound data stored in Neo4j, providing a user-friendly interface for complex analysis.
- Customizable: Easily configure the system to work with your specific environment and tools.
Configure the MCP Server
Usage
Configuration
To customize BloodHound MCP, update the configuration file in your MCP-supported tool. Key settings include:
- Neo4j Database Connection:
BLOODHOUND_URI
: The URI of your Neo4j database (e.g., bolt://localhost:7687).BLOODHOUND_USERNAME
: Your Neo4j username.BLOODHOUND_PASSWORD
: Your Neo4j password.
- Server Settings: Adjust the command and args to match your environment and tool requirements.
Contributing
We welcome contributions to BloodHound MCP! To get involved:
- Fork the Repository: Create your own copy on GitHub.
- Create a Branch: Work on your feature or fix in a new branch.
- Submit a Pull Request: Include a clear description of your changes.
Special Thanks
Custom queries from : https://github.com/CompassSecurity/BloodHoundQueries
You must be authenticated.
Tools
- tool://route_all_owned_enabled_non_privileged_group_memberships
- tool://list_all_enabled_users_with_password_never_expires_not_changed_last_year
- tool://list_all_owned_enabled_users_with_rdp_and_sessions
- tool://route_all_owned_enabled_users_with_dangerous_rights_to_groups
- tool://route_from_owned_enabled_users_to_unconstrained_delegation
- tool://find_all_owned_users_where_group_grants_azure_privileged_access
- tool://list_enabled_non_privileged_users_with_local_admin_and_sessions
- tool://route_non_privileged_users_with_dangerous_rights_to_users
An extension that allows Large Language Models to interact with and analyze Active Directory environments through natural language queries instead of manual Cypher queries.