Traffic Cloak
Control anonymity tooling from a single menu:
check status, start/stop services and quickly inspect interfaces
using ifconfig / ip a.
Structured Hacking / Pentesting & Reporting tool by AnLoMinus. Centralize recon, anonymized network flows and Markdown reporting into a single battle-ready interface.
Legal & Ethical Notice: Run Diablo only on targets you own or have explicit written permission to test.
$# Download & run Diablo $wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo $chmod +x Diablo $./Diablo
Diablo is a focused Pentesting / Hacking & Reporting tool designed to: automate reconnaissance, structure full assessment flows and generate clean Markdown reports for each engagement.
Diablo aligns to typical pentest phases: planning, recon, gaining access, maintaining access, covering tracks and reporting – with clear menus and logs.
Control anonymity tooling from a single menu:
check status, start/stop services and quickly inspect interfaces
using ifconfig / ip a.
Define Target IP, project name and domain, then bootstrap the initial Markdown report file for that engagement.
Orchestrate network, port, DNS, web and OSINT enumeration with
tools like masscan, nmap, dig,
dnsrecon, nikto, enum4linux and more.
Planned modules to help structure exploitation and persistence in a controlled, logged fashion – aligned to ethical guidelines.
Future capabilities to simulate or study log handling, cleanup and blue-team detection, for lab and training purposes only.
Extended report generation and risk analysis helpers built around Markdown logs created during the run.
Use Diablo as the backbone of your engagement: from scoping to recon, while generating a per-project Markdown trail.
Diablo is a single script. Download, mark as executable and run.
$# Download & run $wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo $chmod +x Diablo $./Diablo
$# Same flow under Termux $wget https://raw.githubusercontent.com/Anlominus/Diablo/main/Diablo $chmod +x Diablo $./Diablo
$# Ubuntu / Debian $sudo apt-get install masscan nmap dnsutils whois nikto enum4linux dirb $# macOS $brew install masscan nmap
The core usage pattern is menu-driven. Diablo creates a per-project
log file like TestProject-Diablo-Log.md as you work.
$./Diablo # In the menu: # [1] Planning and Scoping # - Set Target IP (e.g. 192.168.1.1) # - Set Project Name (e.g. TestProject) # - Set Domain (e.g. example.com) # [2] Recon & Vulnerability Assessment # - Automated scans and enumeration flows # - Report file: TestProject-Diablo-Log.md
$./Diablo # [a] Anonymity Surfing # [1] Status # [2] Start anonsurf # [3] Stop anonsurf
Always combine anonymity tooling with proper authorization and clear boundaries. OpSec is part of ethical hacking, not a replacement for consent.
Use these quick checks before starting and before handing off any report. They keep engagements traceable, authorized and consistent.
Ensure the environment is safe to touch and every action is approved.
Ship only what is necessary for remediation and learning.
Use the documentation to understand architecture, get started quickly and track future plans for the toolkit.
Jump into focused guides that extend the main landing page. Each page stays lightweight, practical, and ready for real engagements.
Phase-by-phase flows for recon, exploitation, and post-engagement cleanup.
Reference builds for safe testing spaces and reproducible demos.
Templates, tone, and delivery checklists to ship better findings.
Diablo is built for learning, lab work and authorized professional engagements. Responsibility and law come first.