
Top picks: LinEnum, LFI-files, Vulneri Pentest — plus 45 more compared.
Vulnerability ManagementLFI-Enum is a free Penetration Testing tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to LFI-Enum, including their key features and shared capabilities.
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities
Continuous pentest platform simulating real attacks across web, cloud, and network assets.
Agentic AI platform for continuous, autonomous penetration testing of enterprise apps.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
A script to enumerate Google Storage buckets and determine access and privilege escalation
LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.
A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities
Continuous pentest platform simulating real attacks across web, cloud, and network assets.
Agentic AI platform for continuous, autonomous penetration testing of enterprise apps.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
Linux Exploit Suggester; suggests possible exploits based on the Linux operating system release number.
PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A tool for privilege escalation within Linux environments by targeting vulnerabilities in SUDO usage.
A next generation version of enum4linux with enhanced features for enumerating information from Windows and Samba systems.
A Python library that simplifies format string vulnerability exploitation by providing tools for payload generation, memory manipulation, and automated parameter detection.
Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.
A Linux exploit suggestion tool that identifies potential privilege escalation vulnerabilities by analyzing kernel versions and matching them against a database of known exploits.
A Linux privilege escalation auditing tool that identifies potential kernel vulnerabilities and suggests applicable exploits based on system analysis.
A Python script that performs security testing attacks against AWS Cognito services including account creation, user enumeration, and privilege escalation vulnerabilities.
A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.
A security assessment tool that identifies AWS IAM permissions by systematically testing API calls to determine the actual scope of access granted to specific credentials.
GNU/Linux Wireless distribution for security testing with XFCE desktop environment.
A brute force parameter discovery tool for identifying hidden GET and POST parameters in web applications during security assessments.
A Python-based tool that automates the identification and exploitation of file inclusion and directory traversal vulnerabilities in web applications.
A collection of Local File Inclusion (LFI) vulnerability tests and exploitation techniques designed for use with Burp Suite.
A framework for testing and exploiting race condition vulnerabilities through concurrent request analysis and timing attack automation.
A tool for identifying and exploiting SSRF vulnerabilities in modern cloud environments by filtering host lists to find viable attack candidates.
ESC is an interactive .NET SQL console client with enhanced SQL Server discovery and data exfiltration features designed for penetration testing and red team engagements.
A tool for testing and exploiting Cross-Site Scripting (XSS) vulnerabilities.
A tool to detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.
A security tool for discovering and analyzing interesting files in AWS S3 buckets across multiple regions and bucket types.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
AI-powered autonomous penetration testing platform with multi-agent system
AI-powered automated penetration testing platform for vulnerability discovery
AI-powered automated penetration testing platform for web apps, APIs & GraphQL
Human-guided continuous pentesting platform with attack surface management
AI-powered automated pen testing & continuous red teaming platform
Pentest management platform for reporting, project mgmt & client collaboration
Pentest reporting & exposure mgmt platform for vulnerability remediation
Automated pentesting for web apps & APIs with continuous vulnerability scanning
Penetration testing software for simulating attacks and validating vulnerabilities
Automated internal network penetration testing and security validation platform
Continuous pentesting service monitoring web apps & APIs for code changes
AI-powered automated penetration testing platform for web apps and networks
AI-powered automated penetration testing platform for on-demand security audits
AI-powered autonomous pentesting platform for continuous security validation
Common questions security professionals ask when evaluating alternatives and competitors to LFI-Enum.
The most popular alternatives to LFI-Enum include LinEnum, LFI-files, Vulneri Pentest, Tenzai, and o365-attack-toolkit. These Penetration Testing tools offer similar capabilities and are frequently compared by security professionals evaluating their options.