Convert BloodHound zip files to nmap xml for use in reporting software. Created by Cory Wolff from Layer 8 Security
git clone https://github.com/layer8secure/converthound
python3 converthound.py convert BLOODHOUND_ZIP_FILE
Should work without additional dependencies.
Takes an BLOODHOUND ZIP FILE and outputs an nmap xml file of the discovered hosts and a csv file of discovered usernames. Outputs to the ./converthound directory.
Built as an easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac.
When a BloodHound zip file is converted two files are generated and placed in the ./converthound
folder:
- ORIGINAL_FILE_NAME_computers.xml
- ORIGINAL_FILE_NAME_users.csv
The resulting xml file follows nmap DTD formatting and can be imported to any reporting software that supports nmap xml output. This file will include the hostname found during the SharpHound scan. No additional host info is included at this time. The second generated file is a csv listing all users that were found from SharpHound. This users file will include username, firstname, domain, email, title, and home directory if found.
This is v1. Pull requests and collaboration welcomed.
- Cory Wolff - Senior Security Consultant at Layer 8 Security
- Add additional host info to xml output
- Support additional output formats
- Create csv of hosts with OS, open ports, etc
For additional feature requests please submit an issue and add the enhancement
tag.