Legion is a semi-automated network penetration testing framework for discovery, reconnaissance, and exploitation.
Legion is an open-source, semi-automated network penetration testing framework that assists security professionals in discovering, scanning, and exploiting vulnerabilities in information systems. It integrates multiple security tools into a unified graphical interface, automating reconnaissance tasks and correlating vulnerabilities with known exploits. The tool is designed to streamline the testing process, making it more efficient and accessible.
Penetration testers, security researchers, and red teamers who need an extensible, GUI-driven tool for network security assessments. It suits both beginners seeking guided automation and experts requiring customizable workflows.
Developers choose Legion for its balance of automation and control, offering a user-friendly interface that reduces manual effort while allowing deep customization through modular scripts. Its active development, Docker support, and integration with tools like Nmap and Exploit-Database provide a reliable, up-to-date testing environment.
Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.
Integrates nearly 100 auto-scheduled scripts from tools like Nmap, Nikto, and Hydra, streamlining discovery and scanning phases as highlighted in the features list.
Offers a PyQT6-based GUI with context menus, task completion estimates, and one-click scanning, making it accessible for both novice and experienced testers.
Allows users to easily customize and integrate their own scripts and tools by editing configuration files, enhancing flexibility for tailored testing workflows.
Automatically detects CPEs and CVEs, linking CVEs to exploits from the Exploit-Database, which aids in efficient exploitation during assessments.
The README details lengthy setup procedures, especially for Docker on non-standard systems, and warns that traditional installation is difficult to support across platforms, requiring specific fixes like for Nmap segfaults on Kali.
Officially promises correct operation only on Ubuntu 20.04 for traditional installation, with other distros like Kali needing workarounds, indicating platform-specific instability.
The notice about the repository moving to a new location suggests potential instability or breaking changes during the transition, which could affect updates and support.
Metasploit Framework
A tool for secrets management, encryption as a service, and privileged access management
An evolving how-to guide for securing a Linux server.
🤖 The Modern Port Scanner 🤖
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.