Skip to content

layer8secure/ConvertHound

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Layer-8-Logo-Wide

ConvertHound

Convert BloodHound zip files to nmap xml for use in reporting software. Created by Cory Wolff from Layer 8 Security

Installation

git clone https://github.com/layer8secure/converthound

Usage

python3 converthound.py convert BLOODHOUND_ZIP_FILE

Should work without additional dependencies.

Takes an BLOODHOUND ZIP FILE and outputs an nmap xml file of the discovered hosts and a csv file of discovered usernames. Outputs to the ./converthound directory.

ConvertHound

About

Built as an easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac.

When a BloodHound zip file is converted two files are generated and placed in the ./converthound folder:

  1. ORIGINAL_FILE_NAME_computers.xml
  2. ORIGINAL_FILE_NAME_users.csv

The resulting xml file follows nmap DTD formatting and can be imported to any reporting software that supports nmap xml output. This file will include the hostname found during the SharpHound scan. No additional host info is included at this time. The second generated file is a csv listing all users that were found from SharpHound. This users file will include username, firstname, domain, email, title, and home directory if found.

This is v1. Pull requests and collaboration welcomed.

Author

Roadmap

  • Add additional host info to xml output
  • Support additional output formats
  • Create csv of hosts with OS, open ports, etc

For additional feature requests please submit an issue and add the enhancement tag.

License

MIT License

About

An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by Layer 8.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages