And more useful than I thought.
They are pretty easy to set up and extremely useful.
It Uses graph theory to reveal the hidden and often unintended relationships within an Active Directory or Azure environment. Attackers can use BloodHound to quickly identify highly complex attack ...