https://github.com/compasssecurity/bloodhoundce-resources
https://github.com/compasssecurity/bloodhoundce-resources
Last synced: 8 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/compasssecurity/bloodhoundce-resources
- Owner: CompassSecurity
- Created: 2025-01-14T12:14:10.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2025-05-27T16:16:12.000Z (9 months ago)
- Last Synced: 2025-06-08T21:06:54.014Z (8 months ago)
- Language: PowerShell
- Size: 165 KB
- Stars: 54
- Watchers: 5
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Compass Security BloodHound CE Resources

This repository contains some useful resources regarding BloodHound CE:
- BloodHound CE Custom Queries [↓](#bloodhound-ce-custom-queries)
- BloodHound Operator Custom Queries [↓](#bloodhound-operator-custom-queries)
- Useful Links [↓](#useful-links)
## BloodHound CE Custom Queries
These queries are used in BloodHound CE to analyze your collected data.
### Direct Usage
You can directly copy the [BloodHound CE Custom
Queries](custom_queries/BloodHound_CE_Custom_Queries.md) from your browser into
your BloodHound CE instance.
### Import
#### Initial Preparation
Install PowerShell on Kali:
```bash
sudo apt -y install powershell
```
Clone the BloodHoundOperator repository:
```bash
git clone https://github.com/SadProcessor/BloodHoundOperator.git
```
Create a new API Key in BloodHound via Settings → My Profile → API Key
Management → Create Token.
#### Query Import
Load the BloodHound Operator module, authenticate using the created API tokens
and create a new session:
```powershell
Import-Module /opt/BloodHoundOperator/BloodHoundOperator.ps1
$BHTokenKey = "WW91ciBCbG9vZEhvdW5kIEFQSSBLZXkgY29tZXMgaGVyZSA6KQ=="
$BHTokenID = "596F7572-2054-6F6B-656E-204944203A29"
$BHServer = "127.0.0.1"
$BHPort = "8080"
New-BHSession -Server $BHServer -Port $BHPort -TokenID $BHTokenID -Token (ConvertTo-SecureString -AsPlainText -Force $BHTokenKey)
Get-BHSession
```
For your convinience, so that you don't have to type the commands above every
time, you can copy the
[Create-BloodHoundOperatorSession.ps1](scripts/Create-BloodHoundOperatorSession.ps1)
script, modify it so it matches the values of your
installation and import it:
```powershell
Import-Module /opt/Create-BloodHoundOperatorSession.ps1
```
After creating the session, execute the import script to import the queries:
```powershell
cd scripts
.\Import-BloodHoundCECustomQueries.ps1
```
The imported queries are then shown in BloodHound:

## BloodHound Operator Custom Queries
These queries are used in a BloodHound Operator session, to modify your
collected data.
### Usage
1. Authenticate to the BloodHound API as explained above.
2. Directly copy the [BloodHound Operator Custom
Queries](custom_queries/BloodHound_Operator_Custom_Queries.md) from your
browser into your PowerShell console.
## Useful Links
### BloodHound
- BloodHound Documentation: https://bloodhound.specterops.io/
- Nodes: https://bloodhound.specterops.io/resources/nodes/overview
- Edges: https://bloodhound.specterops.io/resources/edges/overview
- Release Notes: https://bloodhound.specterops.io/resources/release-notes/summary
- BloodHound GitHub: https://github.com/SpecterOps/BloodHound
- SharpHound GitHub: https://github.com/SpecterOps/SharpHound
### Neo4J Cypher
- Neo4J: Cypher Manual: https://neo4j.com/docs/cypher-manual
- Neo4J: Cypher Cheat Sheet: https://neo4j.com/docs/cypher-cheat-sheet/
- Cypher Queries in BloodHound Enterprise:
https://posts.specterops.io/cypher-queries-in-bloodhound-enterprise-c7221a0d4bb3
- BloodHound: Searching with Cypher:
https://support.bloodhoundenterprise.io/hc/en-us/articles/16721164740251-Searching-with-Cypher