Latest version: v1.1.2
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Attackers think in graphs, defenders think in actions, management think in charts. GoodHound operationalises Bloodhound by determining the busiest paths to high value targets and creating actionable output to prioritise remediation of attack paths.
No known vulnerabilities found
Has known vulnerabilities