Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges
-
Updated
Aug 13, 2025 - Python
Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges
AutoHound — LLM-powered AD attack path discovery ingest bloodhound data. claude reasons over the graph. surfaces privilege escalation chains your queries never find. outputs ATT&CK-mapped commands. runs in your lab. stays offline. built for operators who are tired of clicking through graphs manually.
Add a description, image, and links to the sharphound topic page so that developers can more easily learn about it.
To associate your repository with the sharphound topic, visit your repo's landing page and select "manage topics."