Legion is an open source, easy-to-use, super-extensible, and semi-automated network penetration testing framework that aids in discovery, reconnaissance, and exploitation of information systems. It features automatic recon and scanning with tools like NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer, and more, along with a graphical interface and modular functionality for customization.
Common questions about Legion including features, pricing, alternatives, and user reviews.
Legion is An open source network penetration testing framework with automatic recon and scanning capabilities. It is a Vulnerability Management solution designed to help security teams with Reconnaissance, Scanner.
Legion is a free Vulnerability Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/GoVanguard/legion/ for download and installation instructions.
Popular alternatives to Legion include:
Compare these tools and more at https://cybersectools.com/categories/vulnerability-management
Legion is for security teams and organizations that need Reconnaissance, Scanner. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Vulnerability Management tools can be found at https://cybersectools.com/categories/vulnerability-management
A bash-based framework for discovering and extracting exposed .git repositories from web servers during penetration testing and bug bounty activities.
A Burp Suite plugin that performs intelligent content discovery by analyzing current requests to identify directories, files, and variations based on the application's structure.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
Autonomous red teaming stack for recon, pentesting, threat intel & brand defense.
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.