MCP Server LogoMCP Server
MCPsCategoriesDirectorySubmit
Submit
MCPsCategoriesDirectorySubmit
Submit

MCP Servers

A curated list of MCP Servers, featuring Awesome MCP Servers and Claude MCP integration.

Contact Us

[email protected]

About

Privacy PolicyTerms of Service

Resources

Model Context ProtocolMCP Starter GuideClaude MCP Servers

Community

GitHub

© 2026 mcpserver.cc © 2025 MCP Server. All rights reserved.

Privacy PolicyTerms of Service
  1. Home
  2. /Categories
  3. /Other / Misc
  4. /Bloodhound Mcp Ai
Bloodhound Mcp Ai

Bloodhound Mcp Ai

Created by MorDavid•7 months ago
Visit Website

BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to analyze Active Directory attack paths using natural language instead of complex Cypher queries.

Other / Misc
aibloodhoundbloodhoundadcypher-query-languagemcp

BloodHound-MCP

Model Context Protocol (MCP) Server for BloodHound

BloodHound-MCP is a powerful integration that brings the capabilities of Model Context Procotol (MCP) Server to BloodHound, the industry-standard tool for Active Directory security analysis. This integration allows you to analyze BloodHound data using natural language, making complex Active Directory attack path analysis accessible to everyone.

🥇 First-Ever BloodHound AI Integration!
This is the first integration that connects BloodHound with AI through MCP, originally announced here.

🔍 What is BloodHound-MCP?

BloodHound-MCP combines the power of:

  • BloodHound: Industry-standard tool for visualizing and analyzing Active Directory attack paths
  • Model Context Protocol (MCP): An open protocol for creating custom AI tools, compatible with various AI models
  • Neo4j: Graph database used by BloodHound to store AD relationship data

With over 75 specialized tools based on the original BloodHound CE Cypher queries, BloodHound-MCP allows security professionals to:

  • Query BloodHound data using natural language
  • Discover complex attack paths in Active Directory environments
  • Assess Active Directory security posture more efficiently
  • Generate detailed security reports for stakeholders

📱 Community

Join our Telegram channel for updates, tips, and discussion:

  • Telegram: root_sec

🌟 Star History

✨ Features

  • Natural Language Interface: Query BloodHound data using plain English
  • Comprehensive Analysis Categories:
    • Domain structure mapping
    • Privilege escalation paths
    • Kerberos security issues (Kerberoasting, AS-REP Roasting)
    • Certificate services vulnerabilities
    • Active Directory hygiene assessment
    • NTLM relay attack vectors
    • Delegation abuse opportunities
    • And much more!

📋 Prerequisites

  • BloodHound 4.x+ with data collected from an Active Directory environment
  • Neo4j database with BloodHound data loaded
  • Python 3.8 or higher
  • MCP Client

🔧 Installation

  1. Clone this repository:

    git clone https://github.com/your-username/MCP-BloodHound.git
    cd MCP-BloodHound
    
  2. Install dependencies:

    pip install -r requirements.txt
    
  3. Configure the MCP Server

    "mcpServers": {
        "BloodHound-MCP": {
            "command": "python",
            "args": [
                "<Your_Path>\BloodHound-MCP.py"
            ],
            "env": {
                "BLOODHOUND_URI": "bolt://localhost:7687",
                "BLOODHOUND_USERNAME": "neo4j",
                "BLOODHOUND_PASSWORD": "bloodhoundcommunityedition"
            }
        }
    }
    

🚀 Usage

Example queries you can ask through the MCP:

  • “Show me all paths from kerberoastable users to Domain Admins”
  • “Find computers where Domain Users have local admin rights”
  • “Identify Domain Controllers vulnerable to NTLM relay attacks”
  • “Map all Active Directory certificate services vulnerabilities”
  • “Generate a comprehensive security report for my domain”
  • “Find inactive privileged accounts”
  • “Show me attack paths to high-value targets”

🔐 Security Considerations

This tool is designed for legitimate security assessment purposes. Always:

  • Obtain proper authorization before analyzing any Active Directory environment
  • Handle BloodHound data as sensitive information
  • Follow responsible disclosure practices for any vulnerabilities discovered

📜 License

This project is licensed under the MIT License - see the LICENSE file for details.

🙏 Acknowledgments

  • The BloodHound team for creating an amazing Active Directory security tool
  • The security community for continuously advancing AD security practices


Note: This is not an official Anthropic product. BloodHound-MCP is a community-driven integration between BloodHound and MCP.

Prerequisites

  • •Familiarity with the server domain
  • •Basic understanding of related technologies
  • •Knowledge of Other / Misc

Recommended Server

Mcp Mistral Codestral

Mcp Mistral Codestral

Mcp Crypto Price

Mcp Crypto Price

A Model Context Protocol (MCP) server that provides real-time cryptocurrency analysis via CoinCap's API. Enables Claude and other MCP clients to fetch crypto prices, analyze market trends, and track historical data.

Mcp Mysql

Mcp Mysql

View more → →

Details

Created

June 11, 2025

Last Updated

June 11, 2025

Category

Other / Misc

Author

MorDavid

Share

More Server

Adspirer Mcp Server

Adspirer Mcp Server

Model context Protocol (MCP) server for Adspirer

Cursor A11y Mcp

Cursor A11y Mcp

Chromia Mcp

Chromia Mcp

Ragie Mcp Server

Ragie Mcp Server

Ragie Model Context Protocol Server