This document discusses IIS tilde enumeration, a vulnerability that allows determining if certain files or directories exist on a system by checking HTTP response codes. It presents a Python tool called tilde_enum.py that exploits this vulnerability to recursively enumerate files and directories using wordlists. The tool represents an improvement over existing Java tools by providing full file and directory names rather than just 8.3 versions, and allowing deeper recursion. However, it is still limited in some ways such as not finding all possible files. Future enhancements are proposed to address limitations.