DIABLO
PENTESTING · HACKING · REPORTING
Diablo · Pentesting Suite

Diablo – Automated Recon & Reporting

Structured Hacking / Pentesting & Reporting tool by AnLoMinus. Centralize recon, anonymized network flows and Markdown reporting into a single battle-ready interface.

Shell · Linux · macOS · Termux Markdown Reports · RepoCraft Layout MIT License · Ethical Use Only

Legal & Ethical Notice: Run Diablo only on targets you own or have explicit written permission to test.

~/Diablo · quick start
$# Download & run Diablo
$wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo
$chmod +x Diablo
$./Diablo
            
Diablo pentesting menu preview
Diablo main menu · Recon, Anonymity & Reporting in one place
📖 About

What is Diablo?

Diablo is a focused Pentesting / Hacking & Reporting tool designed to: automate reconnaissance, structure full assessment flows and generate clean Markdown reports for each engagement.

🎯 Core Goals

  • Automate reconnaissance and vulnerability assessment steps.
  • Unify multiple pentest utilities under one consistent UI and log flow.
  • Generate Markdown reports per target/project, ready for hand-off.
  • Keep the workflow simple enough for learning, teaching and exams.

🛠 Stack & Environment

  • Shell-based toolchain (Linux, macOS, Termux).
  • Auto detection of package managers and dependencies.
  • Colorful TUI with structured menus and categories.
  • RepoCraft-style repository layout for long-term maintenance.
✨ Features

Red-Team Radar in One Console

Diablo aligns to typical pentest phases: planning, recon, gaining access, maintaining access, covering tracks and reporting – with clear menus and logs.

[a] Anonymity Surfing

Traffic Cloak

Control anonymity tooling from a single menu: check status, start/stop services and quickly inspect interfaces using ifconfig / ip a.

Anonsurf Network Manager OpSec
[1] Planning & Scoping

Engagement Blueprint

Define Target IP, project name and domain, then bootstrap the initial Markdown report file for that engagement.

Target IP Project Name Domain
[2] Recon & Vuln Scan

Deep Surface Scan

Orchestrate network, port, DNS, web and OSINT enumeration with tools like masscan, nmap, dig, dnsrecon, nikto, enum4linux and more.

Network Ports DNS Web OSINT
[3] In Development

Gaining & Maintaining Access

Planned modules to help structure exploitation and persistence in a controlled, logged fashion – aligned to ethical guidelines.

Exploitation Flow Persistence Logging
[4] In Development

Covering Tracks

Future capabilities to simulate or study log handling, cleanup and blue-team detection, for lab and training purposes only.

OpSec Training Detection Lab
[5] In Development

Analysis & Reporting

Extended report generation and risk analysis helpers built around Markdown logs created during the run.

Markdown Findings Risk Levels
📡 Flow

Typical Diablo Session

Use Diablo as the backbone of your engagement: from scoping to recon, while generating a per-project Markdown trail.

Step 0
Scope & Rules
Confirm written permission, scope boundaries, time windows and permitted techniques with the client or project owner.
Step 1
Planning & Scoping
Run [1], define IP / ranges, project code name and domains. Diablo spins up an initial report file.
Step 2
Recon Menu
Use [2] to orchestrate network, port and web recon. Let Diablo log tools and outputs for you.
Step 3
Export Report
Use the generated Markdown file as a base for the final engagement report, risks and remediation steps.
Step 4
Review & Debrief
Sanity-check findings, remove any unrelated data and deliver only what is in scope and legally allowed to share.
🚀 Install

Quick Install & Requirements

Diablo is a single script. Download, mark as executable and run.

Linux / macOS

$# Download & run
$wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo
$chmod +x Diablo
$./Diablo
            

Termux (Android)

$# Same flow under Termux
$wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo
$chmod +x Diablo
$./Diablo
            

Dependencies

$# Ubuntu / Debian
$sudo apt-get install masscan nmap dnsutils whois nikto enum4linux dirb

$# macOS
$brew install masscan nmap
            
⚠️
Install and run these tools only on systems you own or are explicitly authorized to test. Misuse can be illegal and harmful.
🎯 Usage

From Menu to Markdown

The core usage pattern is menu-driven. Diablo creates a per-project log file like TestProject-Diablo-Log.md as you work.

Basic Session

$./Diablo

# In the menu:
# [1] Planning and Scoping
#   - Set Target IP (e.g. 192.168.1.1)
#   - Set Project Name (e.g. TestProject)
#   - Set Domain (e.g. example.com)

# [2] Recon & Vulnerability Assessment
#   - Automated scans and enumeration flows
#   - Report file: TestProject-Diablo-Log.md
            

Anonymity Example

$./Diablo

# [a] Anonymity Surfing
#   [1] Status
#   [2] Start anonsurf
#   [3] Stop anonsurf
            

Always combine anonymity tooling with proper authorization and clear boundaries. OpSec is part of ethical hacking, not a replacement for consent.

✅ Readiness

Pre-flight & Reporting Guardrails

Use these quick checks before starting and before handing off any report. They keep engagements traceable, authorized and consistent.

📝 Before You Run Diablo

Ensure the environment is safe to touch and every action is approved.

  • Authorization and scope are documented.
  • Network changes are coordinated with owners.
  • Fallback contacts are ready if services degrade.

📤 Before You Deliver

Ship only what is necessary for remediation and learning.

  • Sensitive or out-of-scope data removed.
  • Risks prioritized with actionable fixes.
  • Logs archived securely for audit and lessons learned.
📚 Docs & Roadmap

Dive Deeper into Diablo

Use the documentation to understand architecture, get started quickly and track future plans for the toolkit.

Documentation

Markdown First RepoCraft Layout CI / CD Ready

Roadmap Snapshot

  • Done: Planning & Scoping, Recon & Vuln Assessment, Anonymity Surfing.
  • Done: RepoCraft structure, CI/CD workflows, extended documentation.
  • In Progress: Gaining & Maintaining Access modules.
  • In Progress: Covering tracks & Blue-Team perspective training.
  • Planned: Rich Analysis & Reporting layer and a Web UI.
🧭 Explore

Recommended Pages

Jump into focused guides that extend the main landing page. Each page stays lightweight, practical, and ready for real engagements.

📓 Playbooks

Phase-by-phase flows for recon, exploitation, and post-engagement cleanup.

  • Recon and enumeration jump starts.
  • Privilege escalation and pivoting notes.
  • Containment and cleanup reminders.
Open Playbooks

🧪 Lab Setup

Reference builds for safe testing spaces and reproducible demos.

  • Segmented networks and logging defaults.
  • Baseline VM / container profiles.
  • Patch and rollback routines.
Open Lab Setup

📝 Reporting

Templates, tone, and delivery checklists to ship better findings.

  • Executive summaries with risk context.
  • Repro steps with artifacts and commands.
  • Hand-off and remediation follow-through.
Open Reporting
🔐 Security & Ethics

Use Diablo Responsibly

Diablo is built for learning, lab work and authorized professional engagements. Responsibility and law come first.

🚨
Ethical Use Only.
Use Diablo strictly on assets you own or are explicitly allowed to test. Always comply with local laws, contract terms and organizational security policies.
For vulnerability disclosures, follow the project’s Security Policy and open a private, responsible channel whenever possible.