Introducing BloodHound Scentry: Accelerate your APM practice. Learn More
BloodHound Enterprise
Advance from mapping to eliminating attack paths with the enterprise platform that delivers at scale
BloodHound Community Edition
Start mapping attack paths with the open-source tool that started it all
BloodHound Scentry
Accelerate your APM practice and reduce identity risk with expert guidance to protect your critical assets.
OFFENSIVE SERVICES
TRAINING
Adversary Tactics
Adversary Perspectives
TRAININGS
SO-CON 2026
Master in-demand skills with our specialized courses at SO-CON 2026.
SOLUTIONS
INDUSTRIES
PARTNERS & INTEGRATIONS
RESOURCES
Attack Path Management Maturity Model
Evaluate your ability to stop identity-based attacks
Our Commitment to 
Open Source
Committed to advancing the community through open source contributions, cutting-edge research, and knowledge sharing
OPEN SOURCE TOOLS
Join the Conversation
Learn from others and share your story on the BloodHoundGang Slack Community
OPEN SOURCE RESEARCH
Collaborative Editing
Ghostwriter now supports real-time collaborative editing for observation...
ABOUT US
GET IN TOUCH
PRESS RELEASE
SpecterOps and Tines Partner to Automate Attack Path Management with Native BloodHound Integration
FEATURED EVENT
Conference: April 13-14, 2026 Training: April 15-18, 2026
RESEARCH
BLOG
EVENTS
Fueling the Fight Against Identity Attacks
When we founded SpecterOps, one of our core principles was to build a...
The Renaissance of NTLM Relay Attacks
NTLM relay attacks have been around for a long time. While many security...
See the latest by Forrest Kasler
Industry Insights
Epic Pentest Fail
How to Wreck Entra with a Single Mistyped Character This is a cautionary tale. Always read the docs when you…
By: Forrest Kasler
8 mins
Teach a Man to Phish
PHISHING SCHOOL A Decade of Distilled Phishing Wisdom I decided to give away all of my phishing secrets for free. I…
5 mins
Research & Tradecraft
Sleeping With the Phishes
Hiding C2 With Stealthy Callback Channels Write a custom command and control (C2) implant — Check ✅ Test it on…
12 mins
Deep Sea Phishing Pt. 2
PHISHING SCHOOL Making Your Malware Look Legit to Bypasses EDR I wanted to write this blog about several good techniques for…
Deep Sea Phishing Pt. 1
PHISHING SCHOOL How to Bypass EDR With Custom Payloads If endpoint detection and response (EDR) protections keep blocking your phishing payloads,…
17 mins
Phish Out of Water
PHISHING SCHOOL Bypassing Web Proxies so Your Phish Don’t Suffocate You just fought long and hard to convince a user…
13 mins
Drink Like a Phish
PHISHING SCHOOL How to Make Your Phishing Sites Blend In As you read this, bots are coming to find and destroy…
Like Shooting Phish in a Barrel
PHISHING SCHOOL Bypassing Link Crawlers You’ve just convinced a target user to click your link. In doing so, you have achieved…
14 mins
I Will Make you Phishers of Men
PHISHING SCHOOL Convincing Targets to Click Your Links When it comes to phishing advice, the number one question I get from…
21 mins