Introducing BloodHound Scentry: Accelerate your APM practice. Learn More
BloodHound Enterprise
Advance from mapping to eliminating attack paths with the enterprise platform that delivers at scale
BloodHound Community Edition
Start mapping attack paths with the open-source tool that started it all
BloodHound Scentry
Accelerate your APM practice and reduce identity risk with expert guidance to protect your critical assets.
OFFENSIVE SERVICES
TRAINING
Adversary Tactics
Adversary Perspectives
TRAININGS
SO-CON 2026
Master in-demand skills with our specialized courses at SO-CON 2026.
SOLUTIONS
INDUSTRIES
PARTNERS & INTEGRATIONS
RESOURCES
Attack Path Management Maturity Model
Evaluate your ability to stop identity-based attacks
Community Hub
Share tradecraft, ask questions, work on open-source projects, and learn together. Events, community wins, and videos, all in one place.
OPEN SOURCE TOOLS
Join the Conversation
Learn from others and share your story on the BloodHoundGang Slack Community
OPEN SOURCE RESEARCH
Collaborative Editing
Ghostwriter now supports real-time collaborative editing for observation...
ABOUT US
GET IN TOUCH
PRESS RELEASE
SpecterOps Launches BloodHound Scentry to Accelerate the Practice of Identity Attack Path Management
FEATURED EVENT
Conference: April 13-14, 2026 Training: April 15-18, 2026
RESEARCH
BLOG
EVENTS
Fueling the Fight Against Identity Attacks
When we founded SpecterOps, one of our core principles was to build a...
The Renaissance of NTLM Relay Attacks
NTLM relay attacks have been around for a long time. While many security...
Research & Tradecraft
🧙 Merlin Adds DLL Agent & PowerShell Invoke-Merlin Script
By: Russel Van Tuyl
4 mins
🧙 Merlin Adds Module Support 🔌
3 mins
Defenders Think in Graphs Too! Part 1
By: Jared Atkinson
7 mins
BloodHound
SharpHound: Target Selection and API Usage
By: Rohan Vazarkar
8 mins
A Red Teamer’s Guide to GPOs and OUs
By: Andy Robbins
20 mins
Company Updates
Introducing the Adversary Resilience Methodology — Part Two
Introducing the Adversary Resilience Methodology — Part One
18 mins
Reviving DDE: Using OneNote and Excel for Code Execution
By: Matt Nelson
Threat Mitigation Strategies: Observations and Recommendations
Full disclosure: This post is heavy on text. Much of the content is very broad and uses simplified examples. There…
By: James Tubberville
22 mins
Sign up for the latest updates
By clicking Sign Up you're confirming that you agree with our Terms and Conditions.