Announcement: CyberCX to join Accenture →

Introducing Blade: Streamlined command-line tool for Bloodhound and Neo4j

Technical

By George Ntrallos, Security Testing & Assurance (STA) on 29 August 2025

 

Introduction

BloodHound and neo4j are popular open-source tools used by red teams, blue teams, and penetration testers to analyse Active Directory (AD) environments.

Blade is a command-line tool written in Go, designed to interact with BloodHound CE and Neo4j using the bloodhound-go-sdk and neo4j-go-driver Golang libraries. It provides a user-friendly command-line interface for querying, injecting, and managing data within the BloodHound CE Neo4j database.

 

How do I use blade?

Prerequisites

Installation

Download the latest version form: [email protected]:CyberCX-STA/blade.git

This can be done by running the following command:

git clone [email protected]:CyberCX-STA/blade.git
cd blade

There are two options for building the executable—one targeting Linux and the other targeting Windows hosts.

make build-windows
sudo make build-linux

 

Configurations

The configurations are automatically generated in the following directories:

~/blade/config.yaml
~/.config/blade/config.yaml

Note: Before using Blade, you need to generate a Bloodhound CE API token. You can do this by running the following command:

blade generate -u <username> -p <password> --create --name <token_name>

 

Features

 


 

Summary

Blade is a command-line tool that interacts with BloodHound CE and Neo4j. It streamlines enumeration for penetration testers and blue teamers through a simple command-line interface.

 


 

References

Other Cyber Security Resources

Ready to get started?

Find out how CyberCX can help your organisation manage risk, respond to incidents and build cyber resilience.