https://github.com/mgeeky/Penetration-Testing-Tools/blob/master/red-teaming/bloodhound/Handy-BloodHound-Cypher-Queries.md
https://github.com/ZephrFish/Bloodhound-CustomQueries
https://github.com/trustedsec/CrackHound
https://github.com/hausec/Bloodhound-Custom-Queries
https://github.com/CompassSecurity/BloodHoundQueries
https://github.com/myexploit/bloodhound-custom-queries
https://github.com/LuemmelSec/Custom-BloodHound-Queries
Blank password and enabled:
MATCH (n:User {enabled: True, passwordnotreqd: True}) RETURN n
Taken from https://northwave-security.com/abusing-empty-passwords-during-your-next-red-teaming-engagement/