mirror of
https://github.com/AnLoMinus/Diablo.git
synced 2026-03-12 13:26:03 +00:00
98 lines
2.8 KiB
Markdown
98 lines
2.8 KiB
Markdown
<div align="center">
|
||
|
||
# [Diablo](https://github.com/Anlominus/Diablo)
|
||
Diablo ~ Hacking / Pentesting Tools
|
||
|
||
<img width="801" alt="image" src="https://user-images.githubusercontent.com/51442719/169661091-5ed6585d-2be0-4706-b3e5-899536e6ca0d.png">
|
||
|
||
</div>
|
||
|
||
# 📜 Menu / To Do
|
||
|
||
- [ ] [a] - Anonymity Surfing
|
||
- [ ] [1] - Planning and Scoping
|
||
- [x] [2] - Reconnaissance & Vulnerability Assessment
|
||
- [ ] [3] - Gaining Access & Maintaining Access
|
||
- [ ] [4] - Covering tracks
|
||
- [x] [5] - Analysis & Reporting
|
||
|
||
┌──[ Anlominus 👽 Diablo $~]
|
||
└──╼
|
||
|
||
# Features
|
||
- [ ] [2] - Reconnaissance & Vulnerability Assessment
|
||
- Scan URL/IP and Report
|
||
- [x] ping
|
||
- [x] nmap
|
||
- [x] dig
|
||
- [x] nslookup
|
||
- [x] whois
|
||
---
|
||
|
||
<details>
|
||
<summary>
|
||
1) Steps Example
|
||
</summary>
|
||
|
||
# Reconnaissance
|
||
- The observation stage:
|
||
- attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack.
|
||
|
||
# Intrusion
|
||
- Based on what the attackers discovered in the reconnaissance phase, they’re able to get into your systems:
|
||
- often leveraging malware or security vulnerabilities.
|
||
|
||
# Exploitation
|
||
- The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold.
|
||
|
||
# Privilege Escalation
|
||
- Attackers often need more privileges on a system to get access to more data and permissions:
|
||
- for this, they need to escalate their privileges often to an Admin.
|
||
|
||
# Lateral Movement
|
||
- Once they’re in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
|
||
- whether that’s higher permissions, more data, or greater access to systems.
|
||
|
||
# Obfuscation / Anti-forensics
|
||
- In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team.
|
||
|
||
# Denial of Service
|
||
- Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked
|
||
|
||
# Exfiltration
|
||
- The extraction stage:
|
||
- getting data out of the compromised system.
|
||
|
||
</details>
|
||
|
||
|
||
---
|
||
|
||
<details>
|
||
<summary align="center">
|
||
<h4> Sources </h4>
|
||
</summary>
|
||
|
||
- Inspirational tools
|
||
- as Anonymity Surfing
|
||
- pl Planning
|
||
- sv Scanning Vulnerability
|
||
- ga Gaining Access
|
||
- ma Maintaining Access
|
||
- ct Covering tracks
|
||
- an Analysis
|
||
- rp Reporting
|
||
- [PeTeReport](https://github.com/1modm/petereport)
|
||
- [PwnDoc](https://github.com/pwndoc/pwndoc)
|
||
|
||
- Tools:
|
||
- [HacKing](https://github.com/Anlominus/HacKing)
|
||
- [PenTest](https://github.com/Anlominus/PenTest)
|
||
- [LALIN](https://github.com/screetsec/LALIN)
|
||
|
||
- Cheat Sheets:
|
||
- [CheatSheets](https://github.com/Anlominus/CheatSheets)
|
||
|
||
|
||
</details>
|