<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Kali_Linux%3A_Legion_%28en%29</id>
	<title>Kali Linux: Legion (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Kali_Linux%3A_Legion_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Kali_Linux:_Legion_(en)&amp;action=history"/>
	<updated>2026-04-15T06:16:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Kali_Linux:_Legion_(en)&amp;diff=71378&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;'''WARNING:''' Legion uses pip instead of pip3, which can be problematic in KALI 2020.2 and later versions.  Legion, a branch from SECFORCE Sparta, is an open-source, easy-to-...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Kali_Linux:_Legion_(en)&amp;diff=71378&amp;oldid=prev"/>
		<updated>2025-01-03T23:08:19Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;WARNING:&amp;#039;&amp;#039;&amp;#039; Legion uses pip instead of pip3, which can be problematic in KALI 2020.2 and later versions.  Legion, a branch from SECFORCE Sparta, is an open-source, easy-to-...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;'''WARNING:''' Legion uses pip instead of pip3, which can be problematic in KALI 2020.2 and later versions.&lt;br /&gt;
&lt;br /&gt;
Legion, a branch from SECFORCE Sparta, is an open-source, easy-to-use, super-extensible, and semi-automated network penetration testing framework that aids in the discovery, reconnaissance, and exploitation of information systems.&lt;br /&gt;
&lt;br /&gt;
==FEATURES==&lt;br /&gt;
&lt;br /&gt;
* Automated reconnaissance and scanning with NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer, and others (with nearly 100 automated scheduled scripts)&lt;br /&gt;
* User-friendly graphical interface with rich menus and context panels that allow pentesters to quickly find and exploit attack vectors on hosts&lt;br /&gt;
* Modular functionality allows users to easily customize Legion and automatically call their own scripts/tools&lt;br /&gt;
* Highly customizable staged scanning for IPS evasion like a ninja&lt;br /&gt;
* Automatic detector of CPE (Common Platform Enumeration) and CVE (Common Vulnerabilities and Exposures)&lt;br /&gt;
* Realtime autosaving of project results and tasks&lt;br /&gt;
* Also features – Calculator: A simple Yet Powerful Calculator available on Windows&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==INSTALLATION==&lt;br /&gt;
&lt;br /&gt;
===TRADITIONAL===&lt;br /&gt;
&lt;br /&gt;
Assuming the use of Ubuntu, Kali, or Parrot Linux with Python 3.6 installed. Other dependencies should install automatically. Through the terminal, type:&lt;br /&gt;
&lt;br /&gt;
 git clone https://github.com/GoVanguard/legion.git&lt;br /&gt;
 cd legion&lt;br /&gt;
 sudo chmod +x startLegion.sh&lt;br /&gt;
 sudo ./startLegion.sh&lt;br /&gt;
&lt;br /&gt;
===DOCKER===&lt;br /&gt;
&lt;br /&gt;
Assuming that Docker and Xauthority are installed. In the terminal, type:&lt;br /&gt;
&lt;br /&gt;
 git clone https://github.com/GoVanguard/legion.git&lt;br /&gt;
 cd legion/docker&lt;br /&gt;
 sudo chmod +x runIt.sh&lt;br /&gt;
 sudo ./runIt.sh&lt;br /&gt;
&lt;br /&gt;
Credit: GoVanguard&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* https://kalilinuxtutorials.com/legion-penetration-testing/&lt;br /&gt;
&lt;br /&gt;
==Interesting Links==&lt;br /&gt;
&lt;br /&gt;
* [[Kali Linux]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>