Diablo ~ Hacking / Pentesting & Reporting

Diablo ~ Pentesting / Hacking & Reporting

wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo; chmod 777 Diablo; ./Diablo

📜 Menu / To Do

  •  [a] - Anonymity Surfing
  •  [1] - Planning and Scoping
  •  [2] - Reconnaissance & Vulnerability Assessment
  •  [3] - Gaining Access & Maintaining Access
  •  [4] - Covering tracks
  •  [5] - Analysis & Reporting

┌──[ Anlominus 👽 Diablo $~]
└──╼


Features

  •  [a] - Anonymity Surfing

    • [#] 📜 Anonimity Surfing Menu
      • [1] - Anonimity Surfing status
      • [2] - Anonimity Surfing start
      • [3] - Anonimity Surfing stop
    • [#] 📜 Network Manager Menu
      • [4] - ifconfig -a
      • [5] - ip a
    •  - Exit / Quit / Close
  •  [1] - Planning and Scoping

    •  Asking for Target IP:
    •  Asking for Target Project Name:
    •  Asking for Target Domain Name:

  •  [2] - Reconnaissance & Vulnerability Assessment
  • [#] Scan ${TargetIP} and Report to: ${TargetName}-Diablo.Log.md
    •  arp
    •  traceroute
    •  ping
    •  nmap
    •  dig
    •  nslookup
    •  whois
    •  dirb

Sources


Diablo BETA

Next Post Previous Post
1 Comments
  • Legato dajmaa
    Legato dajmaa February 28, 2023 at 9:15 AM

    diablo cannot open error aftr doing chmod 777 and ./Diablo

Add Comment
comment url