See why BloodHound Enterprise is awesome

Do you have a general inquiry? Please use our contact form to get in touch.

  • This field is for validation purposes and should be left unchanged.


Organizations’ applications, services, identities, and critical operations are built on top of AD. While taking control of AD may not be the end goal, no other tactic provides the guarantee of achieving the adversary’s true objective.


AD is used by nearly every enterprise. Adversaries can use the same skills to abuse organizations universally across their victims.


The same advanced administrative power features in AD are used by adversaries to persist and complete their objective without the use of exploits.