https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md

https://github.com/ZephrFish/Bloodhound-CustomQueries

https://github.com/trustedsec/CrackHound

https://github.com/hausec/Bloodhound-Custom-Queries

https://github.com/CompassSecurity/BloodHoundQueries

https://github.com/myexploit/bloodhound-custom-queries

https://github.com/LuemmelSec/Custom-BloodHound-Queries

Blank password and enabled:

MATCH (n:User {enabled: True, passwordnotreqd: True}) RETURN n

Taken from https://northwave-security.com/abusing-empty-passwords-during-your-next-red-teaming-engagement/