Skip to content

Latest commit

 

History

History
65 lines (54 loc) · 1.47 KB

README.md

File metadata and controls

65 lines (54 loc) · 1.47 KB

TermHound

A comprehensive Active Directory security analysis tool that integrates with Neo4j to detect vulnerabilities, analyze attack paths, and identify security misconfigurations.

Features

  • Certificate template vulnerability analysis (ESC1-ESC15)
  • Kerberos security assessment
  • Domain privilege escalation paths
  • Attack path analysis from owned users
  • Comprehensive security reporting
  • Color-coded terminal output
  • Detailed JSON reports
  • Supports .zip files with BloodHound ingestion data

Installation

  1. Clone the repository
  2. Install requirements:
    pip install -r requirements.txt

Usage

Basic usage:

python -m termhound --uri "neo4j://localhost:7687" \
    --username neo4j \
    --password your_password \
    --output report.json

With owned users:

python -m termhound  --uri "neo4j://localhost:7687" \
    --username neo4j \
    --password your_password \
    --output report.json \
    --owned "[email protected]" "[email protected]"

Project Structure

termhound/
├── __init__.py
├── requirements.txt
├── README.md
└── src/
    ├── __init__.py
    ├── analyzer.py
    ├── reporters.py
    └── queries/
        ├── __init__.py
        ├── certificate_queries.py
        ├── domain_queries.py
        ├── kerberos_queries.py
        └── privilege_queries.py

Requirements

  • Python 3.8+
  • Neo4j 4.4+
  • BloodHound data imported into Neo4j