Bloodhound & neo4j https://bloodhound.readthedocs.io/en/latest/installation/linux.html
SharpHound https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/SharpHound.ps1
BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify.
powershell -ep bypass
. .\SharpHound.ps1
Invoke-BloodHound -CollectionMethod All -Domain theoffice.local -ZipFilename the_office.zip
Once its done collecting the data, we can then proceed to our attacker machine and Visualize the data using BloodHound