BloodHound
Active Directory attack-path graphing: ingest collectors, map privilege chains, and plan remediations.
Why it is included
Industry-standard visualization for AD risk in purple-team and pentest deliverables.
Best for
Enterprise AD assessments with legal access to directory data.
Strengths
- Graph analytics
- Collector ecosystem
- Remediation focus
Limitations
- Requires domain credentials or lab data; sensitive output
Good alternatives
AD reporting tools · Custom LDAP analytics
Related tools
Security & Privacy
Impacket
Python classes and scripts for low-level Windows network protocols (SMB, MSRPC, Kerberos, LDAP, etc.).
Security & Privacy
NetExec
Network post-exploitation Swiss Army knife for SMB/WinRM/LDAP/MSSQL/WMI—successor spirit to CrackMapExec.
Security & Privacy
kube-hunter
Penetration testing tool for Kubernetes clusters: active hunting modules for API exposure, services, and misconfigs.
Security & Privacy
Metasploit Framework
Modular exploitation framework with payloads, encoders, auxiliaries, and integration points for exploit development.
Security & Privacy
OWASP ZAP
OWASP flagship web app scanner and proxy: automated checks, manual request tampering, scripting, and CI integrations.
Security & Privacy
sqlmap
Automatic SQL injection and database takeover helper with fingerprinting, data exfiltration, and OS-shell paths.
