npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
> **Legal Notice:** This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.
Maps Active Directory attack paths and privilege escalations using BloodHound/SharpHound data collection and analysis for authorized red teaming and pentesting.
Maps Active Directory attack paths using BloodHound and SharpHound to identify privilege escalation chains from compromised accounts to domain admins.
Uses BloodHound and SharpHound to enumerate Active Directory relationships, reveal attack paths, and identify privilege escalations to Domain Admin during security assessments.
Share bugs, ideas, or general feedback.
Legal Notice: This skill is for authorized security testing and educational purposes only. Unauthorized use against systems you do not own or have written permission to test is illegal and may violate computer fraud laws.
BloodHound is a graph-based Active Directory reconnaissance tool that uses graph theory to reveal hidden and unintended relationships within AD environments. Red teams use BloodHound to identify attack paths from compromised accounts to high-value targets such as Domain Admins, identifying privilege escalation chains that would be nearly impossible to find manually. SharpHound is the official data collector that gathers AD objects, relationships, ACLs, sessions, and group memberships.
| Tool | Purpose | Platform |
|---|---|---|
| BloodHound CE | Graph visualization and analysis | Web-based |
| SharpHound | AD data collection (.NET) | Windows |
| BloodHound.py | AD data collection (Python) | Linux/Windows |
| Cypher queries | Custom graph queries | Neo4j/BloodHound |
| PlumHound | Automated BloodHound reporting | Python |
| Max (BloodHound) | BloodHound automation | Python |
| Query | Purpose |
|---|---|
| Shortest Path to Domain Admins | Find fastest route to DA |
| Find Kerberoastable Users with Path to DA | SPN accounts leading to DA |
| Find AS-REP Roastable Users | Accounts without pre-auth |
| Shortest Path from Owned Principals | Paths from compromised accounts |
| Find Computers with Unsupported OS | Legacy systems for exploitation |
| Find Users with DCSync Rights | Accounts that can replicate AD |
| Find GPOs that Modify Local Group Membership | GPO-based privilege escalation |