LiteHound is a Liteweight, standalone Active Directory (AD) attack path visualizer. It provides a simple, interactive GUI to analyze SharpHound JSON exports without the need for Neo4j, Java, or complex database configurations.
-
Interactive Graph Engine: Drag nodes to reorganize, scroll to zoom, and right-click to pan.
-
DACL Awareness: Automatically parses permissions like GenericAll, WriteDacl, Owns, and more.
-
Shortest Path Analysis: One-click pathfinding from any user to the "Domain Admins" group.
-
Deep Detail Panel: Click any node to see the full raw JSON data collected by SharpHound.
-
Zero Dependencies: Built entirely with standard Python libraries (tkinter, json, zipfile).
-
π΅ Users
-
π’ Groups
-
π Computers
-
π‘ High Value (Tier 0)
Prerequisites
Python 3.x
Installation
- Clone the repository:
git clone https://github.com/zrnge/LiteHound.git
cd LiteHound- Run the application:
python lite_hound.py-
Run SharpHound on a target domain to generate a .zip export.
-
Open LiteHound and click π Load ZIP.
-
Use the search bar or click a node to find the shortest path to Domain Admins.
-
Explore the Object Details panel on the right for forensic-level inspection.
Zrnge
GitHub: @zrnge
This project is licensed under the MIT License.
