This document provides an overview of the BloodHound tool for analyzing Active Directory environments. It describes what BloodHound is, how it works, its history and updates. It also covers various ingestors for collecting AD data, the Cypher query language, and tips for using BloodHound including finding high value principals, attacking groups and computers, and common post-exploitation techniques.