Traffic Cloak
+
+ Control anonymity tooling from a single menu:
+ check status, start/stop services and quickly inspect interfaces
+ using ifconfig / ip a.
+
diff --git a/index.html b/index.html new file mode 100644 index 0000000..17dbf2c --- /dev/null +++ b/index.html @@ -0,0 +1,1149 @@ + + +
+ ++ Structured Hacking / Pentesting & Reporting tool by AnLoMinus. + Centralize recon, anonymized network flows and Markdown reporting into a single + battle-ready interface. +
+ + + + + ++ Legal & Ethical Notice: + Run Diablo only on targets you own or have explicit written permission to test. +
++$# Download & run Diablo +$wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo +$chmod +x Diablo +$./Diablo ++
+ + Diablo is a focused Pentesting / Hacking & Reporting tool designed to: + automate reconnaissance, structure full assessment flows and generate clean Markdown + reports for each engagement. +
++ Diablo aligns to typical pentest phases: planning, recon, gaining access, + maintaining access, covering tracks and reporting – with clear menus and logs. +
+
+ Control anonymity tooling from a single menu:
+ check status, start/stop services and quickly inspect interfaces
+ using ifconfig / ip a.
+
+ Define Target IP, project name and domain, then + bootstrap the initial Markdown report file for that engagement. +
+
+ Orchestrate network, port, DNS, web and OSINT enumeration with
+ tools like masscan, nmap, dig,
+ dnsrecon, nikto, enum4linux and more.
+
+ Planned modules to help structure exploitation and persistence + in a controlled, logged fashion – aligned to ethical guidelines. +
++ Future capabilities to simulate or study log handling, cleanup and + blue-team detection, for lab and training purposes only. +
++ Extended report generation and risk analysis helpers built + around Markdown logs created during the run. +
++ Use Diablo as the backbone of your engagement: from scoping to + recon, while generating a per-project Markdown trail. +
++ Diablo is a single script. Download, mark as executable and run. +
++$# Download & run +$wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo +$chmod +x Diablo +$./Diablo ++ +
+$# Same flow under Termux +$wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo +$chmod +x Diablo +$./Diablo ++
+$# Ubuntu / Debian +$sudo apt-get install masscan nmap dnsutils whois nikto enum4linux dirb + +$# macOS +$brew install masscan nmap ++ +
+ The core usage pattern is menu-driven. Diablo creates a per-project
+ log file like TestProject-Diablo-Log.md as you work.
+
+$./Diablo + +# In the menu: +# [1] Planning and Scoping +# - Set Target IP (e.g. 192.168.1.1) +# - Set Project Name (e.g. TestProject) +# - Set Domain (e.g. example.com) + +# [2] Recon & Vulnerability Assessment +# - Automated scans and enumeration flows +# - Report file: TestProject-Diablo-Log.md ++
+$./Diablo + +# [a] Anonymity Surfing +# [1] Status +# [2] Start anonsurf +# [3] Stop anonsurf ++
+ Always combine anonymity tooling with proper authorization + and clear boundaries. OpSec is part of ethical hacking, not a + replacement for consent. +
++ Use the documentation to understand architecture, get started + quickly and track future plans for the toolkit. +
++ Diablo is built for learning, lab work and authorized professional + engagements. Responsibility and law come first. +
+