blog category
BloodHound
BloodHound
BloodHound v8: Usability, Extensibility, and OpenGraph
TL;DR BloodHound v8 introduces exciting new features enabling users to get more and do more with the BloodHound Attack Path Management platform. These include enhanced abilities to work...
By: Justin Kohler
Jul 29, 2025 • 18 min read
Read Post
BloodHound
Updates to the MSSQLHound OpenGraph Collector for BloodHound
tl;dr: MSSQLHound, a PowerShell script that collects security information from remote MSSQL Server instances, now scans...
By: Chris Thompson
Jan 20, 2026 • 7 min read
Read Post
BloodHound
MSSQL and SCCM Elevation of Privilege Vulnerabilities
TL;DR: I found two privilege escalation vulnerabilities, one in MSSQL (CVE-2025-49758) and one in Microsoft Configuration...
By: Chris Thompson
Jan 15, 2026 • 16 min read
Read Post
BloodHound
Introducing ConfigManBearPig, a BloodHound OpenGraph Collector for SCCM
tl;dr: Security researchers have discovered 30+ unique attack techniques targeting SCCM in the past several years,...
By: Chris Thompson
Jan 13, 2026 • 45 min read
Read Post
BloodHound
Mapping Deception with BloodHound OpenGraph
TL;DR As defensive postures continue to mature, deception technologies provide organizations the opportunity to harden defenses...
By: Ben Schroeder
Dec 23, 2025 • 27 min read
Read Post
BloodHound
Azure Seamless SSO: When Cookie Theft Doesn’t Cut It
TL;DR The cookie crumbled when it expired, but the attack path didn’t. Learn how BloodHound graph...
By: Andrew Gomez
Dec 11, 2025 • 17 min read
Read Post
BloodHound
Operationalizing BloodHound Enterprise: Security automation with Tines
TL;DR This blog demonstrates how to operationalize BloodHound Enterprise by using Tines to quickly assess the...
By: Hugo van den Toorn, Joey Dreijer
Dec 9, 2025 • 8 min read
Read Post
BloodHound
Taming the Attack Graph: A Many Subgraphs Approach to Attack Path Analysis
TL;DR This blog presents a framework using technology subgraphs, decomposition, and graph abstraction to model hybrid...
By: JD Crandell
Nov 13, 2025 • 8 min read
Read Post
BloodHound
TL;DR: You can use PingOneHound in conjunction with BloodHound Community Edition to discover, analyze, execute, and...
By: Andy Robbins
Oct 20, 2025 • 14 min read
Read Post
BloodHound
The Clean Source Principle and the Future of Identity Security
TL;DR Modern identity systems are deeply interconnected, and every weak dependency creates an attack path — no...