
Top picks: PowerUp, Patrowl, o365-attack-toolkit — plus 45 more compared.
Vulnerability Managementenum4linux-ng is a free Penetration Testing tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to enum4linux-ng, including their key features and shared capabilities.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
Vulnerability management & pentest platform for SMBs.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
Compares target's patch levels against Microsoft vulnerability database and detects missing patches.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A collection of precompiled Windows exploits for privilege escalation.
A Python script that performs security testing attacks against AWS Cognito services including account creation, user enumeration, and privilege escalation vulnerabilities.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
Compares target's patch levels against Microsoft vulnerability database and detects missing patches.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A collection of precompiled Windows exploits for privilege escalation.
A Python script that performs security testing attacks against AWS Cognito services including account creation, user enumeration, and privilege escalation vulnerabilities.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.
A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.
A 32-bit assembler level analyzing debugger for Microsoft Windows.
A brute force parameter discovery tool for identifying hidden GET and POST parameters in web applications during security assessments.
Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.
ESC is an interactive .NET SQL console client with enhanced SQL Server discovery and data exfiltration features designed for penetration testing and red team engagements.
A security tool for discovering and analyzing interesting files in AWS S3 buckets across multiple regions and bucket types.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
AI-powered autonomous penetration testing platform with multi-agent system
AI-powered automated penetration testing platform for vulnerability discovery
AI-powered automated penetration testing platform for web apps, APIs & GraphQL
Human-guided continuous pentesting platform with attack surface management
AI-powered automated pen testing & continuous red teaming platform
Pentest management platform for reporting, project mgmt & client collaboration
Pentest reporting & exposure mgmt platform for vulnerability remediation
Automated pentesting for web apps & APIs with continuous vulnerability scanning
Penetration testing software for simulating attacks and validating vulnerabilities
Automated internal network penetration testing and security validation platform
Continuous pentesting service monitoring web apps & APIs for code changes
AI-powered automated penetration testing platform for web apps and networks
AI-powered automated penetration testing platform for on-demand security audits
AI-powered autonomous pentesting platform for continuous security validation
Modular offensive security platform for continuous monitoring and testing
AI-native multi-agent pentesting engine for autonomous vulnerability discovery
AI-driven autonomous pentesting platform for continuous vulnerability discovery
Continuous automated pentesting platform for ongoing security assessment
Autonomous AI system for continuous penetration testing and exploit validation
Cloud-based penetration testing platform for threat mgmt & remediation
Managed continuous penetration testing service for internal & external networks
Autonomous penetration testing platform identifying attack paths & vulnerabilities
Automated network penetration testing tool for internal and external attacks
Continuous pentesting platform with autonomous AI agents for web apps and APIs
AI-powered continuous pentesting platform with agentic automation
AI-powered pentest & VMDR platform for vulnerability scanning & management
Common questions security professionals ask when evaluating alternatives and competitors to enum4linux-ng.
The most popular alternatives to enum4linux-ng include PowerUp, Patrowl, o365-attack-toolkit, Windows Exploit Suggester, and GCPBucketBrute. These Penetration Testing tools offer similar capabilities and are frequently compared by security professionals evaluating their options.
There are 48 alternatives to enum4linux-ng listed on CybersecTools, all within the Penetration Testing category. Each alternative is matched based on shared capabilities, tags, and NIST CSF coverage areas.
enum4linux-ng is a free Penetration Testing tool. You can use it at no cost. Both free and commercial alternatives are available for comparison.
enum4linux-ng is a Penetration Testing tool within the broader Vulnerability Management category. It is used by security professionals for penetration testing capabilities and can be compared against 48 similar tools.