Packages and Binaries:

legion

This package contains an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, reconnaissance and exploitation of information systems.

Legion is a fork of SECFORCE’s Sparta.

Installed size: 3.37 MB
How to install: sudo apt install legion

Dependencies:
  • dirbuster
  • dnsmap
  • enum4linux
  • eyewitness | cutycapt
  • finger
  • hping3
  • hydra
  • imagemagick
  • impacket-scripts
  • ldap-utils
  • mariadb-client-core
  • medusa
  • metasploit-framework
  • nbtscan
  • netcat-traditional
  • nfs-common
  • nikto
  • nmap
  • perl
  • polenum
  • postgresql-client
  • python3
  • python3-colorama
  • python3-pandas
  • python3-pyexploitdb
  • python3-pyfiglet
  • python3-pyqt6
  • python3-pyshodan
  • python3-qasync
  • python3-requests
  • python3-rich
  • python3-serial-asyncio
  • python3-service-identity
  • python3-six
  • python3-sqlalchemy
  • python3-termcolor
  • python3-urllib3
  • rdesktop
  • rpcbind
  • rsh-redone-client | rsh-client
  • ruby
  • smbclient
  • smtp-user-enum
  • snmp
  • sparta-scripts
  • sqlmap
  • sslscan
  • sslyze
  • telnet
  • theharvester
  • unicornscan
  • urlscan
  • vncviewer
  • wafw00f
  • wapiti
  • whatweb
  • wordlists
  • wpscan
  • x11-apps
  • xserver-xephyr
  • xsltproc
  • xvfb
legion
root@kali:~# legion -h
usage: legion.py [-h] [--mcp-server] [--headless] [--input-file INPUT_FILE]
                 [--discovery] [--staged-scan] [--output-file OUTPUT_FILE]
                 [--run-actions]

Start Legion

options:
  -h, --help            show this help message and exit
  --mcp-server          Start MCP server for AI integration
  --headless            Run Legion in headless (CLI) mode
  --input-file INPUT_FILE
                        Text file with targets (hostnames, subnets, IPs, etc.)
  --discovery           Enable host discovery (default: enabled)
  --staged-scan         Enable staged scan
  --output-file OUTPUT_FILE
                        Output file (.legion or .json)
  --run-actions         Run scripted actions/automated attacks after
                        scan/import



Updated on: 2025-Oct-14