GitHound is a BloodHound OpenGraph collector for GitHub, designed to map your organization’s structure and permissions into a navigable attack‑path graph. It:
-
Models Key GitHub Entities
- GHOrganization: Your GitHub org metadata
- GHUser: Individual user accounts in the org
- GHTeam: Teams that group users for shared access
- GHRepository: Repositories within the org
- GHBranch: Named branches in each repo
- GHOrgRole, GHTeamRole, GHRepoRole: Org‑, team‑, and repo‑level roles/permissions
-
Visualize & Analyze in BloodHound
- Access Audits: See at a glance who has admin/write/read on repos and branches
- Compliance Checks: Validate least‑privilege across teams and repos
- Incident Response: Trace privilege escalations and group memberships
With GitHound, you get a clear, interactive graph of your GitHub permissions landscape—perfect for security reviews, compliance audits, and rapid incident investigations.
Settings -> Developer settings -> Personal access tokens -> Fine-grained tokens -> Generate new token
-
Repository access -> All repositories
-
"Administrator" repository permissions (read)
-
"Contents" repository permissions (read)
-
"Metadata" repository permissions (read)
-
"Custom organization roles" organization permissions (read)
-
"Custom repository roles" organization permissions (read)
-
"Members" organization permissions (read)
This walkthrough is for administrators to create the Fine-grained Personal Access Token that is necessary to collect the data that is necessary for the GitHub based BloodHound Graph. These steps should be followed in the context of an organization administrator in order to ensure the resulting PAT will have full access to Repositories, Users, and Teams in the GitHub Organization.
To generate a personal access token browse to your user settings as shown in the image below:
In the settings menu, scroll to the bottom where you will see the "Developer settings" menu option. Click it.
GitHub offers many options for programmatic access. GitHound, our collector, is built to work with Fine-grained Personal Access Tokens, so click on that menu item.
After reaching the Fine-grained Personal Access Token page, you can click on the "Generate new token" button in the top right corner.
Fine-grained Personal Access Tokens offer administrators the ability to specifically control what resources the PAT will have access to.
It is possible to limit the set of repositories that a Fine-grained PAT can interact with. GitHound requires access to all repositories, so we will select the "All repositories" radio button.
Next, we will define the specific repository and organization permissions that GitHound requires. GitHound is a read-only tool, so we will make sure to specify read-only access for each option as shown in the image below:
The following permissions are required:
Target | Permission | Access |
---|---|---|
Repository | Administrator | Read-only |
Repository | Contents | Read-only |
Repository | Metadata | Read-only |
Organization | Administrator | Read-only |
Organization | Custom organization roles | Read-only |
Organization | Custom repository roles | Read-only |
Organization | Members | Read-only |
Once the PAT is created, GitHub will present it to you as shown below. You must save this value (preferably in a password manager) at this point as you will not be able to recover it in the future.
- Open a PowerShell terminal
- Load
github.ps1
in your current PowerShell session:
. ./github.ps1
- Create a GitHub Session using your Personal Access Token.
$session = New-GitHubSession -OrganizationName <Name of your Organization> -Token (Get-Clipboard)
Note: You must specify the name of your GitHub organziation. For example, this repository is part of the SpecterOps
organization, so I would specify SpecterOps
as the argument for the OrganizationName parameter. Additionally, you must specify your Personal Access Token. I find that it is easiest to paste it directly from the clipboard as this is where it will be after you create it or if you save it in a password manager.
- Run the collection on the specified organization:
Invoke-GitHound -Session $session
This will output the payload to the current working directory as githound_<your_org_identifier>.json
.
- Upload the payload via the Ingest File page in BloodHound or via the API.
If you do not have a GitHub Enterprise environment or if you want to test out GitHound before collecting from your own production environment, we've included a sample data set at ./samples/example.json
.
Nodes correspond to each object type.
Edge Type | Source | Target | Travesable | Custom |
---|---|---|---|---|
GHContains |
GHOrganization |
GHOrgRole |
n | n/a |
GHContains |
GHOrganization |
GHRepoRole |
n | n/a |
GHContains |
GHOrganization |
GHRepository |
n | n/a |
GHContains |
GHOrganization |
GHTeamRole |
n | n/a |
GHContains |
GHOrganization |
GHTeam |
n | n/a |
GHContains |
GHOrganization |
GHUser |
n | n/a |
OPContains |
GHRepository |
GHBranch |
n | n/a |
GHHasRole |
GHUser |
GHOrgRole |
y | n/a |
GHHasRole |
GHUser |
GHRepoRole |
y | n/a |
GHHasRole |
GHUser |
GHTeamRole |
y | n/a |
GHMemberOf |
GHTeamRole |
GHTeam |
y | n/a |
GHMemberOf |
GHTeam |
GHTeam |
y | n/a |
GHAddMember |
GHTeamRole |
GHTeam |
y | n/a |
GHCreateRepository |
GHOrgRole |
GHOrganization |
n | n/a |
GHInviteMember |
GHOrgRole |
GHOrganization |
n | n/a |
GHAddCollaborator |
GHOrgRole |
GHOrganization |
n | n/a |
GHCreateTeam |
GHOrgRole |
GHOrganization |
n | n/a |
GHTransferRepository |
GHOrgRole |
GHOrganization |
n | n/a |
GHOwns |
GHOrganization |
GHRepository |
y | n/a |
GHBypassPullRequestAllowances |
GHTeam |
GHBranch |
n | n/a |
GHBypassPullRequestAllowances |
GHUser |
GHBranch |
n | n/a |
GHRestrictionsCanPush |
GHTeam |
GHBranch |
n | n/a |
GHRestrictionsCanPush |
GHUser |
GHBranch |
n | n/a |
GHHasBranch |
GHRepository |
GHBranch |
n | n/a |
GHHasBaseRole |
GHOrgRole |
GHOrgRole |
y | n/a |
GHHasBaseRole |
GHOrgRole |
GHRepoRole |
y | n/a |
GHHasBaseRole |
GHRepoRole |
GHRepoRole |
y | n/a |
GHCanPull |
GHRepoRole |
GHRepository |
y | n/a |
GHReadRepoContents |
GHRepoRole |
GHRepository |
y | n |
GHCanPush |
GHRepoRole |
GHRepository |
n | n |
GHWriteRepoContents |
GHRepoRole |
GHRepository |
n | n |
GHWriteRepoPullRequests |
GHRepoRole |
GHRepository |
n | n |
GHAdminTo |
GHRepoRole |
GHRepository |
n | n |
GHManageWebhooks |
GHRepoRole |
GHRepository |
n | y |
GHManageDeployKeys |
GHRepoRole |
GHRepository |
n | y |
GHPushProtectedBranch |
GHRepoRole |
GHRepository |
n | y |
GHDeleteAlertsCodeScanning |
GHRepoRole |
GHRepository |
n | y |
GHViewSecretScanningAlerts |
GHRepoRole |
GHRepository |
n | y |
GHRunOrgMigration |
GHRepoRole |
GHRepository |
n | n |
GHBypassProtections |
GHRepoRole |
GHRepository |
n | y |
GHManageSecurityProducts |
GHRepoRole |
GHRepository |
n | n |
GHManageRepoSecurityProducts |
GHRepoRole |
GHRepository |
n | n |
GHEditProtections |
GHRepoRole |
GHRepository |
n | y |
GHJumpMergeQueue |
GHRepoRole |
GHRepository |
n | y |
GHCreateSoloMergeQueue |
GHRepoRole |
GHRepository |
n | y |
GHEditRepoCustomPropertiesValue |
GHRepoRole |
GHRepository |
n | y |
Find the object identifier for your target user:
MATCH (n:GHUser)
RETURN n
HINT: Select Table Layout
table_layout.mov
Replace the <object_id>
value in the subsequent query with the user's object identifier:
MATCH p = (:GHUser {objectid:"<object_id>"})-[:GHMemberOf|GHAddMember|GHHasRole|GHHasBaseRole|GHOwns*1..]->(:GHRepoRole)-[:GHWriteRepoContents]->(:GHRepository)
RETURN p
Obtain the object identifier for your target repository:
MATCH (n:GHRepository)
RETURN n
Take the object identifier for your target repository and replace the <object_id>
value in the subsequent query with it:
MATCH p = (:GHUser)-[:GHMemberOf|GHHasRole|GHHasBaseRole|GHOwns|GHAddMember*1..]->(:GHRepoRole)-[:GHWriteRepoContents]->(:GHRepository {objectid:"<object_id>"})
RETURN p
MATCH p = (:GHUser)-[:GHHasRole|GHHasBaseRole]->(:GHOrgRole {short_name: "owners"})
RETURN p
MATCH p = (:AZUser)-[:SyncedToGHUser]->(:GHUser)
RETURN p
We welcome and appreciate your contributions! To make the process smooth and efficient, please follow these steps:
-
Discuss Your Idea
- If you’ve found a bug or want to propose a new feature, please start by opening an issue in this repo. Describe the problem or enhancement clearly so we can discuss the best approach.
-
Fork & Create a Branch
- Fork this repository to your own account.
- Create a topic branch for your work:
git checkout -b feat/my-new-feature
-
Implement & Test
- Follow the existing style and patterns in the repo.
- Add or update any tests/examples to cover your changes.
- Verify your code runs as expected:
# e.g. dot-source the collector and run it, or load the model.json in BloodHound
-
Submit a Pull Request
- Push your branch to your fork:
git push origin feat/my-new-feature
- Open a Pull Request against the
main
branch of this repository. - In your PR description, please include:
- What you’ve changed and why.
- How to reproduce/test your changes.
- Push your branch to your fork:
-
Review & Merge
- I’ll review your PR, give feedback if needed, and merge once everything checks out.
- For larger or more complex changes, review may take a little longer—thanks in advance for your patience!
Thank you for helping improve this extension! 🎉
Copyright 2025 Jared Atkinson
Licensed under the Apache License, Version 2.0
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
Unless otherwise annotated by a lower-level LICENSE file or license header, all files in this repository are released
under the Apache-2.0
license. A full copy of the license may be found in the top-level LICENSE file.