AI Isn’t Changing the Game, It’s Speeding It Up: Rethinking Modern Attack Paths Register Now
BloodHound Enterprise
Advance from mapping to eliminating attack paths with the enterprise platform that delivers at scale
BloodHound Community Edition
Start mapping attack paths with the open-source tool that started it all
AI Cyber Ranges
SpecterOps delivers cyber ranges for AI withstandardized environments and realistic conditions to validate model performance against knowncompletion paths.
SERVICES
TRAINING
Adversary Tactics
Adversary Perspectives
TRAININGS
Black Hat USA 2026 Training
Train with the team discovering tomorrow’s attacks.
SOLUTIONS
INDUSTRIES
PARTNERS & INTEGRATIONS
RESOURCES
Attack Path Management Maturity Model
Evaluate your ability to stop identity-based attacks
Community Hub
Share tradecraft, ask questions, work on open-source projects, and learn together. Events, community wins, and videos, all in one place.
OPEN SOURCE TOOLS
Join the Conversation
Learn from others and share your story on the BloodHoundGang Slack Community
OPEN SOURCE RESEARCH
Nemesis 2.2
Nemesis 2.2 introduces a number of powerful new features focusing...
ABOUT US
GET IN TOUCH
PRESS RELEASE
SpecterOps Expands Identity Attack Path Management to Okta, GitHub, and Mac
FEATURED PARTNER
SpecterOps selected for OpenAI’s Trusted Access for Cyber program
RESEARCH
BLOG
EVENTS
REPORT
Trends in Identity Attack Path Management 2026
We surveyed more than 500 security and identity leaders on how their organizations are managing growing identity risk.
Explore AI Resources
SpecterOps helps your organization lean into AI adoption while staying ahead of the risks.
REPORTS
Agentic AI raises the stakes for identity security.
Read more
DATASHEETS
As AI models grow more sophisticated, governments and technology companies need rigorous environments to test model capabilities.
Adversaries use advanced tactics to exploit vulnerabilities and misconfigurations across your environment, from identity systems to applications to infrastructure, that…
Security teams need hands-on experience defending against real-world attack paths to recognize and quickly respond to attack behaviors in production…
Identity has become the connective thread across modern hybrid environments, making identitydriven attacks one of the most critical threat vectors…
CASE STUDIES
A leading financial institution in Canada came to SpecterOps to help solve a problem; they prioritized robust cybersecurity defenses to…
Accelerate your APM practice with expert guidance and extended team capacity
Identity compromises are an existential threat to all organizations, regardless of industry or vertical with over 97% of breaches leveraging…
A U.S. Healthcare Organization Eliminated Hidden Privilege Escalation Chains with BloodHound Enterprise
Manage Identity Attack Paths across your hybrid environment and remove the adversary’s favorite target.
Nemesis functions as an "offensive VirusTotal," automatically processing files collected during security assessments through an extensive pipeline of specialized analyzers.
Ghostwriter is a Django web app for red teams to track projects, clients, assets, reports, and evidence.
Mythic is an open-source Command and Control (C2) framework designed around a microservice architecture.
Crucible is an extensible, multi-user, cross-platform framework designed for post-exploitation, command and control operations, penetration testing, and red teaming.
SharpSCCM is an open-source C# post-exploitation tool designed to leverage Microsoft Configuration Manager.
LudusHound brings BloodHound data to life by creating a fully functional Ludus Range for controlled testing.
SCCMHunter is a post-exploitation tool built to streamline identifying, profiling, and attacking SCCM-related assets in an Active Directory domain.
Merlin is a cross-platform post-exploitation Command & Control server and agent written in Go.
By clicking submit, you're confirming that you agree to our Terms and Conditions.