🚀 Legion bot
This powerful toolset is designed to target Laravel applications, a widely used PHP framework. It includes features for bypassing AWS consoles, checking web server ports, and even generating AWS consoles.
⚡ Key Features
✅ Laravel Cracker – Exploits Laravel-based applications, bypasses security measures, and automates AWS console creation.
✅ Mass Grab – Extracts environment variables, debug information, and other critical data in bulk.
✅ IP Tools – Generate, check, and manipulate IP addresses, including Reverse IP lookups and IP grabbing from services like Leakix.
✅ SMTP & SMS Tools – Test and exploit SMTP servers, send SMS messages, and automate phishing simulations.
✅ CMS & Panel Crackers – Target vulnerabilities in CMS platforms like WordPress, Joomla, and control panels such as cPanel & WHM.
✅ Other Exploits – Includes tools for attacking services like Twilio, SendGrid, and more.


🔧 Setting Up Your Python Environment
1️⃣ Install Python
Ensure Python 3 is installed. Download it from the official Python website.
Verify installation by running:
python3 --version
2️⃣ Install pip (Python Package Manager)
pip usually comes pre-installed, but you can upgrade it using:
python3 -m ensurepip --upgrade
3️⃣ Install Required Modules
Navigate to the directory containing requirements.txt and install dependencies:
pip install -r requirements.txt
⚙️ Configuring settings.ini
The settings.ini file is used to store essential configuration settings. Follow these steps to set it up:
1️⃣ Create or Edit settings.ini
Open or create a file named settings.ini in your project directory.
Add the following configurations:
[Settings]
Your_Email = [email protected]
Timeout = 20
Telegram_Results = on
Chat_ID = your_chat_id
Bot_Token = your_bot_token
2️⃣ Save the File
Once you’ve added your configurations, save the file to apply the changes.
This powerful toolset is designed to target Laravel applications, a widely used PHP framework. It includes features for bypassing AWS consoles, checking web server ports, and even generating AWS consoles.
⚡ Key Features
✅ Laravel Cracker – Exploits Laravel-based applications, bypasses security measures, and automates AWS console creation.
✅ Mass Grab – Extracts environment variables, debug information, and other critical data in bulk.
✅ IP Tools – Generate, check, and manipulate IP addresses, including Reverse IP lookups and IP grabbing from services like Leakix.
✅ SMTP & SMS Tools – Test and exploit SMTP servers, send SMS messages, and automate phishing simulations.
✅ CMS & Panel Crackers – Target vulnerabilities in CMS platforms like WordPress, Joomla, and control panels such as cPanel & WHM.
✅ Other Exploits – Includes tools for attacking services like Twilio, SendGrid, and more.


🔧 Setting Up Your Python Environment
1️⃣ Install Python
Ensure Python 3 is installed. Download it from the official Python website.
Verify installation by running:
python3 --version
2️⃣ Install pip (Python Package Manager)
pip usually comes pre-installed, but you can upgrade it using:
python3 -m ensurepip --upgrade
3️⃣ Install Required Modules
Navigate to the directory containing requirements.txt and install dependencies:
pip install -r requirements.txt
⚙️ Configuring settings.ini
The settings.ini file is used to store essential configuration settings. Follow these steps to set it up:
1️⃣ Create or Edit settings.ini
Open or create a file named settings.ini in your project directory.
Add the following configurations:
[Settings]
Your_Email = [email protected]
Timeout = 20
Telegram_Results = on
Chat_ID = your_chat_id
Bot_Token = your_bot_token
2️⃣ Save the File
Once you’ve added your configurations, save the file to apply the changes.