BloodHound MCP

by stevenyu113228
Verified

Server Configuration

Describes the environment variables required to run the server.

NameRequiredDescriptionDefault
BLOODHOUND_URIYesThe URI of your Neo4j databasebolt://localhost:7687
BLOODHOUND_PASSWORDYesYour Neo4j passwordbloodhound
BLOODHOUND_USERNAMEYesYour Neo4j usernameneo4j

Schema

Prompts

Interactive templates invoked by user choice

NameDescription
prompt

Resources

Contextual data attached and managed by the client

NameDescription

No resources

Tools

Functions exposed to the LLM to take actions

NameDescription
tool://run_query

執行Cypher查詢並返回結果

Args: query: Cypher查詢字符串 parameters: 查詢參數字典

Returns: 查詢結果列表

tool://users_with_most_local_admin_rights

[WIP] Users with Most Local Admin Rights

tool://computers_with_most_sessions

[WIP] Computers with Most Sessions [Required: sessions]

tool://users_with_most_sessions

[WIP] Users with Most Sessions [Required: sessions]

tool://non_privileged_users_with_dangerous_permissions

List non-privileged user(s) with dangerous permissions to any node type

tool://route_non_privileged_users_with_dangerous_permissions

Route non-privileged user(s) with dangerous permissions to any node type

tool://users_with_most_cross_domain_sessions

[WIP] Users with most cross-domain sessions [Required: sessions]

tool://list_high_value_targets

List high value target(s)

tool://list_domains

List domain(s)

tool://list_domain_trusts

List domain trust(s)

tool://list_enabled_users

List enabled user(s)

tool://list_enabled_users_with_email

List enabled user(s) with an email address

tool://list_non_managed_service_accounts

List non-managed service account(s)

tool://list_enabled_principals_with_unconstrained_delegation

List enabled principal(s) with "Unconstrained Delegation"

tool://list_enabled_principals_with_constrained_delegation

List enabled principal(s) with "Constrained Delegation"

tool://list_domain_controllers

List domain controller(s)

tool://list_domain_computers

List domain computer(s)

tool://list_certificate_authority_servers

List Certificate Authority server(s) [Required: Certipy]

tool://list_privileges_for_certificate_authority_servers

[WIP] List privileges for Certificate Authority server(s) [Required: Certipy]

tool://list_all_certificate_templates

List all Certificate Template(s) [Required: Certipy]

tool://find_enabled_certificate_templates

Find enabled Certificate Template(s) [Required: Certipy]

tool://list_all_enrollment_rights_for_certificate_templates

[WIP] List all Enrollment Right(s) for Certificate Template(s)

tool://list_computers_without_laps

List computer(s) WITHOUT LAPS

tool://list_network_shares_ignoring_sysvol

List network share(s), ignoring SYSVOL

tool://list_all_groups

List all group(s)

tool://list_all_gpos

List all GPO(s)

tool://list_all_principals_with_local_admin_permission

List all principal(s) with "Local Admin" permission

tool://list_all_principals_with_rdp_permission

List all principal(s) with "RDP" permission

tool://list_all_principals_with_sqladmin_permission

List all principal(s) with "SQLAdmin" permission

tool://list_all_user_sessions

List all user session(s) [Required: sessions]

tool://list_all_users_with_description_field

List all user(s) with description field

tool://list_all_enabled_users_with_userpassword_attribute

List all enabled user(s) with "userpassword" attribute

tool://list_all_enabled_users_with_password_never_expires

List all enabled user(s) with "password never expires" attribute

tool://list_all_enabled_users_with_password_never_expires_not_changed_last_year

List all enabled user(s) with "password never expires" attribute and not changed in last year

tool://list_all_enabled_users_with_no_password_required

List all enabled user(s) with "don't require passwords" attribute

tool://list_all_enabled_users_never_logged_in

List all enabled user(s) but never logged in

tool://list_all_enabled_users_logged_in_last_90_days

List all enabled user(s) that logged in within the last 90 days

tool://list_all_enabled_users_set_password_last_90_days

List all enabled user(s) that set password within the last 90 days

tool://list_all_enabled_users_with_foreign_group_membership

List all enabled user(s) with foreign group membership

tool://list_all_owned_users

List all owned user(s)

tool://list_all_owned_enabled_users

List all owned & enabled user(s)

tool://list_all_owned_enabled_users_with_email

List all owned & enabled user(s) with an email address

tool://list_all_owned_enabled_users_with_local_admin_and_sessions

List all owned & enabled user(s) with "Local Admin" permission, and any active sessions and their group membership(s)

tool://list_all_owned_enabled_users_with_rdp_and_sessions

List all owned & enabled user(s) with "RDP" permission, and any active sessions and their group membership(s)

tool://list_all_owned_enabled_users_with_sqladmin

List all owned & enabled user(s) with "SQLAdmin" permission

tool://list_all_owned_computers

List all owned computer(s)

tool://route_all_owned_enabled_group_memberships

Route all owned & enabled group membership(s)

tool://route_all_owned_enabled_non_privileged_group_memberships

Route all owned & enabled non-privileged group(s) membership

tool://route_all_owned_enabled_privileged_group_memberships

Route all owned & enabled privileged group(s) membership

tool://route_all_owned_enabled_users_with_dangerous_rights_to_any_node

Route all owned & enabled user(s) with Dangerous Rights to any node type

tool://route_all_owned_enabled_users_with_dangerous_rights_to_groups

Route all owned & enabled user(s) with Dangerous Rights to group(s)

tool://route_all_owned_enabled_users_with_dangerous_rights_to_users

Route all owned & enabled user(s) with Dangerous Rights to user(s)

tool://route_from_owned_enabled_users_to_unconstrained_delegation

Route from owned & enabled user(s) to all principals with "Unconstrained Delegation"

tool://route_from_owned_enabled_principals_to_high_value_targets

Route from owned & enabled principals to high value target(s)

tool://find_all_owned_users_with_privileged_access_to_azure_tenancy

Owned: [WIP] Find all owned user with privileged access to Azure Tenancy (Required: azurehound)

tool://find_all_owned_users_where_group_grants_azure_privileged_access

Owned: [WIP] Find all owned user where group membership grants privileged access to Azure Tenancy (Required: azurehound)

tool://find_all_owners_of_azure_applications_with_dangerous_rights

Owned: [WIP] Find all Owners of Azure Applications with Owners to Service Principals with Dangerous Rights (Required: azurehound)

tool://find_all_owned_groups_granting_network_share_access

Find all owned groups that grant access to network shares

tool://route_all_sessions_to_computers_without_laps

Route all sessions to computers WITHOUT LAPS (Required: sessions)

tool://route_all_sessions_to_computers

Route all sessions to computers (Required: sessions)

tool://list_enabled_non_privileged_users_with_local_admin

List enabled non-privileged user(s) with "Local Admin" permission

tool://list_enabled_non_privileged_users_with_local_admin_and_sessions

List enabled non-privileged user(s) with "Local Admin" permission, and any active sessions and their group membership(s)

tool://list_enabled_non_privileged_users_with_rdp

List enabled non-privileged user(s) with "RDP" permission

tool://list_enabled_non_privileged_users_with_rdp_and_sessions

List enabled non-privileged user(s) with "RDP" permission, and any active sessions and their group membership(s)

tool://list_enabled_non_privileged_users_with_sqladmin

List enabled non-privileged user(s) with "SQLAdmin" permission

tool://list_all_domain_users_group_memberships

List all "Domain Users" group membership(s)

tool://list_all_authenticated_users_group_memberships

List all "Authenticated Users" group membership(s)

tool://find_all_enabled_as_rep_roastable_users

Find all enabled AS-REP roastable user(s)

tool://find_all_enabled_kerberoastable_users

Find all enabled kerberoastable user(s)

tool://route_non_privileged_users_with_dangerous_rights_to_users

Route non-privileged user(s) with dangerous rights to user(s) [HIGH RAM]

tool://route_non_privileged_users_with_dangerous_rights_to_groups

Route non-privileged user(s) with dangerous rights to group(s) [HIGH RAM]

tool://route_non_privileged_users_with_dangerous_rights_to_computers

Route non-privileged user(s) with dangerous rights to computer(s) [HIGH RAM]

tool://route_non_privileged_users_with_dangerous_rights_to_gpos

Route non-privileged user(s) with dangerous rights to GPO(s) [HIGH RAM]

tool://route_non_privileged_users_with_dangerous_rights_to_privileged_nodes

Route non-privileged user(s) with dangerous rights to privileged node(s) [HIGH RAM]

tool://route_non_privileged_computers_with_dangerous_rights_to_users

Route non-privileged computer(s) with dangerous rights to user(s) [HIGH RAM]

tool://route_non_privileged_computers_with_dangerous_rights_to_groups

Route non-privileged computer(s) with dangerous rights to group(s) [HIGH RAM]

tool://route_non_privileged_computers_with_dangerous_rights_to_computers

Route non-privileged computer(s) with dangerous rights to computer(s) [HIGH RAM]

tool://route_non_privileged_computers_with_dangerous_rights_to_gpos

Route non-privileged computer(s) with dangerous rights to GPO(s) [HIGH RAM]

tool://route_non_privileged_computers_with_dangerous_rights_to_privileged_nodes

Route non-privileged computer(s) with dangerous rights to privileged node(s) [HIGH RAM]

tool://list_esc1_vulnerable_certificate_templates

List ESC1 vulnerable Certificate Template(s) [Required: Certipy]

tool://list_esc2_vulnerable_certificate_templates

List ESC2 vulnerable Certificate Template(s) [Required: Certipy]

tool://list_esc3_vulnerable_certificate_templates

List ESC3 vulnerable Certificate Template(s) [Required: Certipy]

tool://list_esc4_vulnerable_certificate_templates

List ESC4 vulnerable Certificate Template(s) [Required: Certipy]

tool://list_esc6_vulnerable_certificate_templates

List ESC6 vulnerable Certificate Template(s) [Required: Certipy]

tool://list_esc7_vulnerable_certificate_templates

List ESC7 vulnerable Certificate Template(s) [Required: Certipy]

tool://list_esc8_vulnerable_certificate_templates

List ESC8 vulnerable Certificate Template(s) [Required: Certipy]

tool://list_all_cross_domain_user_sessions_and_memberships

List all cross-domain user session(s) and user group membership(s)

tool://list_privileged_users_without_protected_users

List privileged user(s) without "Protected Users" group membership

tool://list_custom_privileged_groups

List custom privileged group(s)

tool://list_enabled_svc_accounts_with_privileged_group_memberships

List all enabled SVC account(s) with privileged group membership(s)

tool://route_privileged_users_with_sessions_to_non_privileged_computers

Route all privileged user(s) with sessions to non-privileged computer(s) [Required: sessions]

tool://find_allshortestpaths_with_dangerous_rights_to_adminsdholder

Find allshortestpaths with dangerous rights to AdminSDHolder object

tool://find_allshortestpaths_with_dcsync_to_domain

Find allshortestpaths with DCSync to domain object

tool://find_allshortestpaths_with_shadow_credential_permission

Find allshortestpaths with Shadow Credential permission to principal(s)

tool://list_all_tenancy

List all Tenancy (Required: azurehound)

tool://list_all_aad_groups_synchronized_with_ad

[WIP] List all AAD Group(s) that are synchronized with AD (Required: azurehound)

tool://list_all_principals_used_for_syncing_ad_and_aad

[WIP] List all principal(s) used for syncing AD and AAD

tool://list_all_enabled_azure_users

List all enabled Azure User(s) (Required: azurehound)

tool://list_all_enabled_azure_users_group_memberships

List all enabled Azure User(s) Azure Group membership(s) (Required: azurehound)

tool://list_all_ad_principals_with_edges_to_azure_principals

[WIP] List all AD principal(s) with edge(s) to Azure principal(s) (Required: azurehound)

tool://list_all_principals_with_privileged_access_to_azure_tenancy

[WIP] List all principal(s) with privileged access to Azure Tenancy (Required: azurehound)

tool://route_principals_to_azure_applications_and_service_principals

[WIP] Route all principal(s) that have control permissions to Azure Application(s) running as Azure Service Principals (AzSP), and route from privileged ASP to Azure Tenancy (Required: azurehound)

tool://route_user_principals_to_azure_service_principals

[WIP] Route all user principal(s) that have control permissions to Azure Service Principals (AzSP), and route from AzSP to principal(s) (Required: azurehound)

tool://route_azure_users_with_dangerous_rights_to_users

[WIP] Route from Azure User principal(s) that have dangerous rights to Azure User and User principal(s) (Required: azurehound)

tool://route_principals_to_azure_vm

[WIP] Route from principal(s) to Azure VM (Required: azurehound)

tool://route_principals_to_global_administrators

[WIP] Route from principal(s) to principal(s) with Global Administrator permissions (Required: azurehound)

ID: 3cmhwig3al