Track MCP LogoTrack MCP
Track MCP LogoTrack MCP

The world's largest repository of Model Context Protocol servers. Discover, explore, and submit MCP tools.

Product

  • Categories
  • Top MCP
  • New & Updated
  • Submit MCP

Company

  • About

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2026 TrackMCP. All rights reserved.

Built with ❤️ by Krishna Goyal

    Bloodhound Mcp Ai

    BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory...

    302 stars
    Python
    Updated Nov 2, 2025
    ai
    bloodhound
    bloodhoundad
    cypher-query-language
    mcp
    mcp-server

    Table of Contents

    • Model Context Protocol (MCP) Server for BloodHound
    • 🔍 What is BloodHound-MCP?
    • 📱 Community
    • 🌟 Star History
    • ✨ Features
    • 📋 Prerequisites
    • 🔧 Installation
    • 🚀 Usage
    • 🔐 Security Considerations
    • 📜 License
    • 🙏 Acknowledgments

    Table of Contents

    • Model Context Protocol (MCP) Server for BloodHound
    • 🔍 What is BloodHound-MCP?
    • 📱 Community
    • 🌟 Star History
    • ✨ Features
    • 📋 Prerequisites
    • 🔧 Installation
    • 🚀 Usage
    • 🔐 Security Considerations
    • 📜 License
    • 🙏 Acknowledgments

    Documentation

    BloodHound-MCP

    BloodHound-MCP

    Model Context Protocol (MCP) Server for BloodHound

    BloodHound-MCP is a powerful integration that brings the capabilities of Model Context Procotol (MCP) Server to BloodHound, the industry-standard tool for Active Directory security analysis. This integration allows you to analyze BloodHound data using natural language, making complex Active Directory attack path analysis accessible to everyone.

    🥇 First-Ever BloodHound AI Integration!

    This is the first integration that connects BloodHound with AI through MCP, originally announced here.

    🔍 What is BloodHound-MCP?

    BloodHound-MCP combines the power of:

    • BloodHound: Industry-standard tool for visualizing and analyzing Active Directory attack paths
    • Model Context Protocol (MCP): An open protocol for creating custom AI tools, compatible with various AI models
    • Neo4j: Graph database used by BloodHound to store AD relationship data

    With over 75 specialized tools based on the original BloodHound CE Cypher queries, BloodHound-MCP allows security professionals to:

    • Query BloodHound data using natural language
    • Discover complex attack paths in Active Directory environments
    • Assess Active Directory security posture more efficiently
    • Generate detailed security reports for stakeholders

    📱 Community

    Join our Telegram channel for updates, tips, and discussion:

    • Telegram: root_sec

    🌟 Star History

    Star History Chart

    ✨ Features

    • Natural Language Interface: Query BloodHound data using plain English
    • Comprehensive Analysis Categories:
    • Domain structure mapping
    • Privilege escalation paths
    • Kerberos security issues (Kerberoasting, AS-REP Roasting)
    • Certificate services vulnerabilities
    • Active Directory hygiene assessment
    • NTLM relay attack vectors
    • Delegation abuse opportunities
    • And much more!

    📋 Prerequisites

    • BloodHound 4.x+ with data collected from an Active Directory environment
    • Neo4j database with BloodHound data loaded
    • Python 3.8 or higher
    • MCP Client

    🔧 Installation

    1. Clone this repository:

    bash
    git clone https://github.com/your-username/MCP-BloodHound.git
       cd MCP-BloodHound

    2. Install dependencies:

    bash
    pip install -r requirements.txt

    3. Configure the MCP Server

    bash
    "mcpServers": {
            "BloodHound-MCP": {
                "command": "python",
                "args": [
                    "\\BloodHound-MCP.py"
                ],
                "env": {
                    "BLOODHOUND_URI": "bolt://localhost:7687",
                    "BLOODHOUND_USERNAME": "neo4j",
                    "BLOODHOUND_PASSWORD": "bloodhoundcommunityedition"
                }
            }
        }

    🚀 Usage

    Example queries you can ask through the MCP:

    • "Show me all paths from kerberoastable users to Domain Admins"
    • "Find computers where Domain Users have local admin rights"
    • "Identify Domain Controllers vulnerable to NTLM relay attacks"
    • "Map all Active Directory certificate services vulnerabilities"
    • "Generate a comprehensive security report for my domain"
    • "Find inactive privileged accounts"
    • "Show me attack paths to high-value targets"

    🔐 Security Considerations

    This tool is designed for legitimate security assessment purposes. Always:

    • Obtain proper authorization before analyzing any Active Directory environment
    • Handle BloodHound data as sensitive information
    • Follow responsible disclosure practices for any vulnerabilities discovered

    📜 License

    This project is licensed under the MIT License - see the LICENSE file for details.

    🙏 Acknowledgments

    • The BloodHound team for creating an amazing Active Directory security tool
    • The security community for continuously advancing AD security practices

    Verified on MseeP

    ---

    *Note: This is not an official Anthropic product. BloodHound-MCP is a community-driven integration between BloodHound and MCP.*

    Similar MCP

    Based on tags & features

    • BI

      Biomcp

      Python·
      327
    • DA

      Davinci Resolve Mcp

      Python·
      327
    • AW

      Aws Mcp Server

      Python·
      165
    • FH

      Fhir Mcp Server

      Python·
      55

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k
    View All MCP Servers

    Similar MCP

    Based on tags & features

    • BI

      Biomcp

      Python·
      327
    • DA

      Davinci Resolve Mcp

      Python·
      327
    • AW

      Aws Mcp Server

      Python·
      165
    • FH

      Fhir Mcp Server

      Python·
      55

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k