by MorDavid
BloodHound-MCP is a powerful integration that brings the capabilities of Model Context Procotol (MCP) Server to BloodHound, the industry-standard tool for Active Directory security analysis. This integration allows you to analyze BloodHound data using natural language, making complex Active Directory attack path analysis accessible to everyone.
🥇 First-Ever BloodHound AI Integration!
This is the first integration that connects BloodHound with AI through MCP, originally announced here.
BloodHound-MCP combines the power of:
With over 75 specialized tools based on the original BloodHound CE Cypher queries, BloodHound-MCP allows security professionals to:
Join our Telegram channel for updates, tips, and discussion:
Clone this repository:
git clone https://github.com/your-username/MCP-BloodHound.git cd MCP-BloodHound
Install dependencies:
pip install -r requirements.txt
Configure the MCP Server
"mcpServers": { "BloodHound-MCP": { "command": "python", "args": [ "<Your_Path>\\BloodHound-MCP.py" ], "env": { "BLOODHOUND_URI": "bolt://localhost:7687", "BLOODHOUND_USERNAME": "neo4j", "BLOODHOUND_PASSWORD": "bloodhoundcommunityedition" } } }
Example queries you can ask through the MCP:
This tool is designed for legitimate security assessment purposes. Always:
This project is licensed under the MIT License - see the LICENSE file for details.
Note: This is not an official Anthropic product. BloodHound-MCP is a community-driven integration between BloodHound and MCP.
No version information available