blog category
BloodHound
BloodHound
SpecterOps is excited to announce the launch of our newest addition to BloodHound Enterprise, BloodHound Scentry. BloodHound Scentry is an expert advisory service that uses the proven expertise...
By: Robby Winchester
Feb 10, 2026 • 5 min read
Read Post
BloodHound
SpecterOps is excited to announce the launch of our newest addition to BloodHound Enterprise, BloodHound Scentry....
By: Robby Winchester
Feb 10, 2026 • 5 min read
Read Post
BloodHound
TL;DR : BloodHound Enterprise on-premises brings enterprise-grade identity attack path management to air-gapped, classified, and highly...
By: Sev Kocharian
Jan 29, 2026 • 5 min read
Read Post
BloodHound
Updates to the MSSQLHound OpenGraph Collector for BloodHound
tl;dr: MSSQLHound, a PowerShell script that collects security information from remote MSSQL Server instances, now scans...
By: Chris Thompson
Jan 20, 2026 • 7 min read
Read Post
BloodHound
MSSQL and SCCM Elevation of Privilege Vulnerabilities
TL;DR: I found two privilege escalation vulnerabilities, one in MSSQL (CVE-2025-49758) and one in Microsoft Configuration...
By: Chris Thompson
Jan 15, 2026 • 16 min read
Read Post
BloodHound
Introducing ConfigManBearPig, a BloodHound OpenGraph Collector for SCCM
tl;dr: Security researchers have discovered 30+ unique attack techniques targeting SCCM in the past several years,...
By: Chris Thompson
Jan 13, 2026 • 45 min read
Read Post
BloodHound
Mapping Deception with BloodHound OpenGraph
TL;DR As defensive postures continue to mature, deception technologies provide organizations the opportunity to harden defenses...
By: Ben Schroeder
Dec 23, 2025 • 27 min read
Read Post
BloodHound
Azure Seamless SSO: When Cookie Theft Doesn’t Cut It
TL;DR The cookie crumbled when it expired, but the attack path didn’t. Learn how BloodHound graph...
By: Andrew Gomez
Dec 11, 2025 • 17 min read
Read Post
BloodHound
Operationalizing BloodHound Enterprise: Security automation with Tines
TL;DR This blog demonstrates how to operationalize BloodHound Enterprise by using Tines to quickly assess the...
By: Hugo van den Toorn, Joey Dreijer
Dec 9, 2025 • 8 min read
Read Post
BloodHound
Taming the Attack Graph: A Many Subgraphs Approach to Attack Path Analysis
TL;DR This blog presents a framework using technology subgraphs, decomposition, and graph abstraction to model hybrid...