Legion – An Easy-To-Use, Super-Extensible And Semi-Automated Network Penetration Testing Tool That Aids In Discovery, Reconnaissance And Exploitation Of Information Systems

Legion, a fork of SECFORCE’s Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. Legion is developed and maintained by GoVanguard. More information about Legion, including the product roadmap, can be found on it’s product page at https://GoVanguard.io/legion.FEATURESAutomatic recon and scanning with NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer and more (with almost 100 auto-scheduled scripts)Easy to use graphical interface with rich context menus and panels that allow pentesters to quickly find and exploit attack vectors on hostsModular functionality allows users to easily customize Legion and automatically call their own scripts/toolsHighly customizable stage scanning for ninja-like IPS evasionAutomatic detection of CPEs (Common Platform Enumeration) and CVEs (Common Vulnerabilities and Exposures)Realtime autosaving of project results and tasksNOTABLE CHANGES FROM SPARTARefactored from Python 2.7 to Python 3.6 and the elimination of depreciated and unmaintained librariesUpgraded to PyQT5, increased responsiveness, less buggy, more intuitive GUI that includes features like:Task completion estimates1-Click scan lists of ips, hostnames and CIDR subnetsAbility to purge results, rescan hosts and delete hostsGranual NMAP scanning optionsSupport for hostname resolution and scanning of vhosts/sni hostsRevise process queuing and execution routines for increased app reliability and performanceSimplification of installation with dependency resolution and installation routinesRealtime project autosaving so in the event some goes wrong, you will not loose any progress!Docker container deployment optionSupported by a highly active development teamGIF DEMOINSTALLATIONTRADITIONAL METHODAssumes Ubuntu, Kali or Parrot Linux is being used with Python 3.6 installed. Other dependencies should automatically be installed. Within Terminal:git clone https://github.com/GoVanguard/legion.gitcd legionsudo chmod +x startLegion.shsudo ./startLegion.shDOCKER METHODAssumes Docker and Xauthority are installed. Within Terminal:git clone https://github.com/GoVanguard/legion.gitcd legion/dockersudo chmod +x runIt.shsudo ./runIt.shATTRIBUTIONRefactored Python 3.6+ codebase, added feature set and ongoing development of Legion is credited to GoVanguardThe initial Sparta Python 2.7 codebase and application design is credited SECFORCE.Several additional PortActions, PortTerminalActions and SchedulerSettings are credited to batmancrew.The nmap XML output parsing engine was largely based on code by yunshu, modified by ketchup and modified SECFORCE.ms08-067_check script used by smbenum.sh is credited to Bernardo Damele A.G.Legion relies heavily on nmap, hydra, python, PyQt, SQLAlchemy and many other tools and technologies so we would like to thank all of the people involved in the creation of those.Download Legion

Link: http://feedproxy.google.com/~r/PentestTools/~3/jDSvXwEafjY/legion-easy-to-use-super-extensible-and.html