bloodhound-python -c all --zip -u USER -p PASS -d DOMAIN -ns IP
# run powershell -ep bypass;
. .\SharpHound.ps1
Invoke-Bloodhound -CollectionMethod All -Domain DOMAIN -ZipFileName DOMAIN.zip -LDAPUser USER -LDAPPass PASS [-CollectAllProperties]
.\SharpHound.exe -c All -d DOMAIN [--domaincontroller DOMAIN_IP] --zipfilename DOMAIN.zip --ldapusername USER --ldappassword PASS [--collectallproperties]
--OutputDirectory PATH