BloodBash v1.3.1 is a powerful, standalone BloodHound / SharpHound + AzureHound JSON analyzer written in Python.
It parses real SharpHound collection-per-file JSON (the format actually produced by SharpHound v6+) and AzureHound JSON exports, builds a full networkx directed graph (nodes + all relationships & ACLs from both AD and Azure/Entra ID), detects attack paths, misconfigurations, and high-impact vulnerabilities β completely offline, no Neo4j or BloodHound GUI required.
Perfect for red teamers, OSCP/CRTP/PNPT prep, quick post-collection triage, or when you only have raw SharpHound and/or AzureHound JSON dumps.
- Full AzureHound / Entra ID (Azure AD) support β mixed AD + Azure datasets in the same run
- New Azure analysis modules with dedicated severity scoring & abuse panels:
- Azure Privileged Roles (Global Admin, Privileged Role Admin, etc.)
- Azure App Secrets / Certificates exposure
- Azure MFA Bypass risks
- Azure Guest User access risks
- Azure Service Principal abuse risks
- Azure objects now appear in high-value targets, dangerous permissions, shortest paths, group nesting, trust abuse (cross-tenant), verbose summary, and stats dashboard
- Improved hybrid graph building and type detection for both SharpHound and AzureHound JSON formats
- Azure-specific high-value keywords and relationship handling
- Version bump + minor parsing robustness fixes
- Fixed & hardened SharpHound collection-per-file parsing (users/, computers/, etc.)
- Prioritized Findings table sorted by severity (ESCs, DCSync, RBCD, etc.)
- New modules: Shadow Credentials, Password in Description, LAPS status, full GPO XML content parsing (
--gpo-content-dir), Unconstrained/Constrained Delegation, Trust Abuse, Deep Group Nesting + cycle detection - New CLI flags:
--owned,--path-from/--path-to,--inspect,--deep-analysis,--db(SQLite persistence),--export-bh,--dot,--indirect,--debug - Rich abuse-suggestion panels for every finding
- Multiple export formats + BloodHound-compatible JSON + Graphviz DOT
git clone https://github.com/dotnetrussell/bloodbash.git
cd bloodbash
# Recommended: virtual environment
python3 -m venv venv
source venv/bin/activate # Linux/macOS
# Windows: venv\Scripts\activate
pip install -r requirements.txtrequirements.txt:
networkx>=3.0
rich>=13.0
tqdm>=4.0
pyyaml>=6.0(All other dependencies are in the Python standard library.)
# Full analysis (AD + Azure β recommended)
python3 BloodBash.py /path/to/json --all
# Selective checks (now includes Azure)
python3 BloodBash.py ./sharpout --adcs --dangerous-permissions --dcsync --gpo-abuse --azure-privileged-roles --azure-app-secrets --verbose
# Export everything
python3 BloodBash.py . --all --export=html --export-bh --dot
# Fast mode on huge datasets (skips pathfinding)
python3 BloodBash.py sharpout --all --fast
# Use SQLite cache for repeated runs
python3 BloodBash.py . --db bloodbash.db --all| Flag | Description |
|---|---|
--all |
Run every analysis module (AD + Azure) |
--shortest-paths |
Shortest paths to high-value targets (AD + Azure) |
--dangerous-permissions |
Dangerous ACLs on high-value objects (AD + Azure) |
--adcs |
Full ADCS ESC1βESC8 detection |
--gpo-abuse |
Weak GPO permissions |
--dcsync |
DCSync / replication rights |
--rbcd |
Resource-Based Constrained Delegation |
--sessions |
Sessions / LocalAdmin / RDP / DCOM summary |
--kerberoastable |
Kerberoastable accounts |
--as-rep-roastable |
AS-REP roastable accounts |
--sid-history |
SID History abuse |
--unconstrained-delegation |
Unconstrained delegation |
--password-descriptions |
Passwords stored in user description |
--password-never-expires |
PasswordNeverExpires users |
--password-not-required |
PasswordNotRequired users |
--shadow-credentials |
Shadow Credentials (KeyCredentialLink) |
--gpo-parsing |
Basic GPO content parsing |
--gpo-content-dir DIR |
Full GPO XML analysis (Scheduled Tasks, Scripts, cPassword) |
--constrained-delegation |
Constrained delegation |
--laps |
LAPS enabled/disabled status |
--azure-privileged-roles |
Azure Privileged Roles (new in v1.3.1) |
--azure-app-secrets |
Azure App Secrets/Certificates (new in v1.3.1) |
--azure-mfa-bypass |
Azure MFA Bypass risks (new in v1.3.1) |
--azure-guest-access |
Azure Guest User risks (new in v1.3.1) |
--azure-sp-abuse |
Azure Service Principal abuse (new in v1.3.1) |
--verbose |
Detailed object-type & user summary (AD + Azure counts) |
--owned USERS |
Comma-separated owned principals β paths to them |
--path-from SRC |
Arbitrary shortest paths: source principals |
--path-to DST |
Arbitrary shortest paths: target principals |
--inspect NODES |
Full property + edge dump for specific nodes |
--deep-analysis |
Enable slow group nesting depth + cycle detection (AD + Azure groups) |
--indirect |
Include indirect paths/permissions via groups |
--domain DOMAIN |
Filter everything to a single domain (AD) or tenantId (Azure) |
--export FORMAT |
Export results (md, json, html, csv, yaml) |
--export-bh |
Export full graph as BloodHound-compatible JSON |
--dot [FILE] |
Export key subgraph to Graphviz DOT |
--db FILE |
SQLite persistence (save/load graph) |
--fast |
Skip heavy pathfinding |
--debug |
Verbose debug output |
If no flags are given, the tool runs a minimal default mode (verbose summary + common checks).
- Accurate SharpHound v6+ parsing (handles the real per-collection JSON files with
meta.type) - Full AzureHound / Entra ID parsing (users, groups, applications, service principals, tenants, roles, devices, key vaults) β mixed AD + Azure in one graph
- Full
networkx.MultiDiGraphwith all relationships & ACEs from both platforms - Rich, colored terminal output (tables, panels, highlighted paths)
- Progress bars + live status
- Prioritized Findings sorted by severity score (ESC1-ESC8 = 10, DCSync = 10, Azure Privileged Roles = 10, RBCD = 9, etc.)
- Detailed abuse suggestion panels with tools & commands for every vulnerability (AD + Azure)
- High-value target identification (Domain Admins, krbtgt, CAs, templates + Global Admin, Privileged Role Admin, etc.)
- Complete ADCS ESC1βESC8 detection with exact conditions
- Dangerous permissions (GenericAll, ResetPassword, WriteDacl, + Azure Owns/AddSecret/AddCertificate, etc.)
- GPO abuse + full XML content analysis (Scheduled Tasks, Scripts, cPassword)
- DCSync, RBCD, Kerberoasting, AS-REP roasting, Shadow Credentials, LAPS status, delegation types, SID History, PasswordNeverExpires / PasswordNotRequired
- Azure-specific: privileged roles, app secrets, MFA bypass, guest users, service principal abuse
- Shortest & indirect paths, paths to owned principals, arbitrary custom paths
- Node inspection, group nesting depth & cycle detection (AD + Azure groups)
- Trust abuse detection (cross-domain + cross-tenant)
- Exports: Markdown, JSON, HTML, CSV, YAML, BloodHound-compatible JSON, Graphviz DOT
- SQLite database persistence (
--db) - Domain/tenant filtering, fast mode, debug mode
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ Azure Privileged Roles ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
[red]Privileged Azure role[/red]: Global Administrator
β CONTOSO\svc_azureadmin has this role
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ Prioritized Findings by Severity ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
βββββββββββββββββββ³ββββββββββββββββββββββ³ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β Severity Score β Category β Details β
β‘ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ©
β 10 β Azure Privileged Roles β Privileged role: Global Administrator β
β 10 β ESC1-ESC8 β ESC1/2 on WebServerTemplate β
β 10 β DCSync β CONTOSO\svc_sql can DCSync on contoso.local β
βββββββββββββββββββ΄ββββββββββββββββββββββ΄ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Completed in 12.45 seconds
Pull requests welcome!
High-priority ideas:
- Full ADCS attack-path chaining
- More export formats (PlantUML, Mermaid)
- Integration with BloodHound Enterprise / custom collectors
- Performance optimizations for 100k+ node domains
- Additional Azure/Entra attack paths
MIT License β free to use, modify, and share for authorized security testing and red teaming only.
Happy hunting! π©Έπ






