Skip to content

geo2x/AutoHound

Repository files navigation

AutoHound

AutoHound

AI-Powered Active Directory Attack Path Analysis
by ACH Research Division

Latest Release Platform Claude AI


What is AutoHound?

AutoHound connects to your BloodHound CE instance, reads the Active Directory graph, and uses Claude AI to automatically find attack paths that lead to Domain Admin. It scores each path, maps it to MITRE ATT&CK, generates exploitation commands, and produces a full markdown report.

BloodHound shows you the map. AutoHound tells you the route.


Download

File Description
AutoHound_Setup.exe Full GUI installer — recommended
AutoHound.exe CLI standalone

Quick Start

GUI Installer

  1. Download and run AutoHound_Setup.exe
  2. The installer detects Docker, Python, and BloodHound CE automatically
  3. Enter your Anthropic API key when prompted
  4. Done — start analyzing

CLI

autohound --input ./bloodhound_data/ --output ./reports/

Requirements

  • Windows 10/11 x64
  • Docker Desktop
  • Anthropic API key — get one here
  • BloodHound CE (GUI installer handles this)

Output

AutoHound produces:

  • autohound_report.md — full attack path report with exploitation steps
  • attack_navigator_layer.json — MITRE ATT&CK Navigator layer

Legal

For authorized penetration testing and red team engagements only. Use only on systems you own or have explicit written permission to test. The authors accept no liability for unauthorized use.


© 2026 Gordon Prescott — ACH Research Division. All rights reserved.

About

AutoHound — LLM-powered AD attack path discovery ingest bloodhound data. claude reasons over the graph. surfaces privilege escalation chains your queries never find. outputs ATT&CK-mapped commands. runs in your lab. stays offline. built for operators who are tired of clicking through graphs manually. ⚠️ authorized environments only.

Topics

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Contributors