an active directory recon and exploitation tool that uses FastAPI for cloud possibilities and uses Impacket, Memgraph graphing database, BloodyAD, and other scripts to ensure either exploitation, movement, or security in a domain, Delta2 itself is an API and not a full-on script, write your own scripts to interact with it so you're not a script kiddie 😉, Disclaimer! Most AD CS code was copied from: https://github.com/ly4k/Certipy.git and modified to suit the API's needs and this tool is meant for educational purposes ONLY.
Docker, Docker Compose, and go (for the dfs script)
neo4j is the industry standard but is also really slow compared to memgraph, memgraph is an in-memory graphing database but uses the same bolt protocol and querying language as neo4j. The limit is your RAM. There might be neo4j integration or fork in the future.
Memgraph is ran in the Docker Compose file, no need to run it separately now, you can still configure it to run memgraph in a standalone container if needed though through the API
bash ./run.sha golang script was added for finding the longest path from a node. This script is in the go_dfs directory