summaryrefslogtreecommitdiff
path: root/pwn/packages
diff options
context:
space:
mode:
authorc0co.channel <c0co.channel@braincrime.com>2026-01-09 17:42:55 +0000
committerc0co.channel <c0co.channel@braincrime.com>2026-01-09 17:42:55 +0000
commit7b8d4cd578bb8d5237276e29e71f878ade514b8f (patch)
treeeabd8d838b6e14fdc59847a1119567eda8cc2711 /pwn/packages
parent4f284b4af0ab6710d56d074326c83503a7b1c0e2 (diff)
Add some new pwn services configsHEADmain
Diffstat (limited to 'pwn/packages')
-rw-r--r--pwn/packages/python-bloodhound.scm32
1 files changed, 32 insertions, 0 deletions
diff --git a/pwn/packages/python-bloodhound.scm b/pwn/packages/python-bloodhound.scm
new file mode 100644
index 0000000..c786771
--- /dev/null
+++ b/pwn/packages/python-bloodhound.scm
@@ -0,0 +1,32 @@
+(define-module (pwn packages python-bloodhound)
+ #:use-module (guix packages)
+ #:use-module (guix download)
+ #:use-module (guix gexp)
+ #:use-module (guix build-system python)
+ #:use-module (gnu packages python-crypto)
+ #:use-module (gnu packages python-web)
+ #:use-module (gnu packages python-xyz)
+ #:use-module (gnu packages python-build)
+ #:use-module (pwn packages impacket)
+ #:use-module (guix licenses))
+
+(define-public python-bloodhound
+ (package
+ (name "Bloodhound.py")
+ (version "1.0.1")
+ (source (origin
+ (method url-fetch)
+ (uri (string-append "https://github.com/dirkjanm/BloodHound.py/archive/refs/tags/v" version ".tar.gz"))
+ (sha256
+ (base32
+ "0d3744zbkgilb1zv83kcqsyzb5wraphvbjpn7wc8hkj717mg1vcg"))))
+ (build-system python-build-system)
+ (arguments
+ (list #:tests? #f))
+ (native-inputs (list python-wheel python-future))
+ (propagated-inputs (list impacket python-dnspython python-ldap3 python-pyasn1 python-pycryptodome))
+ (synopsis "Python based ingestor for BloodHound, based on Impacket.")
+ (description "Bloodhound is an Attack Path Management solution that continuously maps and quantifies Active Directory attack paths. It helps eliminate millions—even billions—of attack paths within your existing architecture, removing the attacker’s easiest, most reliable, and most attractive techniques. Originally written by Dirk-jan Mollema, Edwin van Vliet and Matthijs Gielen from Fox-IT (NCC Group), BloodHound.py is currently maintained by Dirk-jan Mollema from Outsider Security. The implementation and data model is based on the original tool from SpecterOps. ")
+ (home-page "https://github.com/dirkjanm/BloodHound.py")
+ (license expat)))
+python-bloodhound