SharpHound.exe is the official data collector for BloodHound, written in C# and uses Windows API functions and LDAP namespace functions to collect data from domain controllers and domain-joined Windows systems. This data can then be fed into BloodHound to enumerate potential paths of privilege escalation. The following command peforms all collection methods and stores the output in a zip file that can be directly placed in the BloodHound GUI.
Command Reference:
Output File: output.zip
-d: domain name
--CollectionMethod: All,GPOLocalGroup (because All skips GPOLocalGroup)
SharpHound.exe -d contoso.local --CollectionMethod All,GPOLocalGroup --ZipFileName output.zip