Skip to content

ajm4n/TermHound

Repository files navigation

TermHound

A comprehensive Active Directory security analysis tool that integrates with Neo4j to detect vulnerabilities, analyze attack paths, and identify security misconfigurations.

Features

  • Certificate template vulnerability analysis (ESC1-ESC15)
  • Kerberos security assessment
  • Domain privilege escalation paths
  • Attack path analysis from owned users
  • Comprehensive security reporting
  • Color-coded terminal output
  • Detailed JSON reports
  • Supports .zip files with BloodHound ingestion data

Installation

  1. Clone the repository
  2. Install requirements:
    pip install -r requirements.txt

Usage

Basic usage:

python -m termhound --uri "neo4j://localhost:7687" \
    --username neo4j \
    --password your_password \
    --output report.json

With owned users:

python -m termhound  --uri "neo4j://localhost:7687" \
    --username neo4j \
    --password your_password \
    --output report.json \
    --owned "[email protected]" "[email protected]"

Project Structure

termhound/
├── __init__.py
├── requirements.txt
├── README.md
└── src/
    ├── __init__.py
    ├── analyzer.py
    ├── reporters.py
    └── queries/
        ├── __init__.py
        ├── certificate_queries.py
        ├── domain_queries.py
        ├── kerberos_queries.py
        └── privilege_queries.py

Requirements

  • Python 3.8+
  • Neo4j 4.4+
  • BloodHound data imported into Neo4j

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages