Internet people tracker: OSINT analysis and research tool TESTED BY the Code:

Internet people tracker: OSINT analysis and research tool TESTED BY the Code:


Installation and operation; 
git clone https://github.com/jofpin/trape.git
cd trape
python2 -m pip install -r require.txt
python2 trape.py -h



Execution example:
> Example: python2 trape.py --url http://example.com --port 8080



Commands executed:
PROCESS HOOKS: manages attacks or social engineering processes in the browser of the target.

 --- MISCELLANEOUS: You can issue a phishing attack from any domain or service in real time, as well as send malicious files to compromise a target's device.

 --- INJECT JS: Keeps the JavaScript code running freely in real time, so you can manage the execution of a keylogger or your own custom functions in JS that will be reflected in the browser of the target.

 --- SPEECH: an audio creation process is maintained that is reproduced in the browser of the target, through which you can execute personalized messages in different voices with languages ​​in Spanish and English.

 PUBLIC NETWORK UNTUNNEL: Trape has its own API that is linked to ngrok.com to allow automatic management of public network tunnels;  Therefore, you can publish the content of your trap server that is running locally on the Internet, to manage hooks or public attacks.


  • You can get information about the user's network.


 --- SPEED: See the network speed of the target.  (Ping, download, upload, write connection)

 --- HOSTS OR DEVICES: Here you can get a scan of all the devices that are connected in the destination network automatically.

 --url In this option, add the URL you want to clone, which works as a decoy.

 --port Here you insert the port, where the trape server is going to run.

 --accesskey You enter a custom key for the capture panel, if you do not insert it it will generate an automatic key.

 --injectcode trape contains a REST API to play anywhere, with this option you can customize the name of the file to include, if it does not, it generates a random name alluding to a token.

 --local Using this option you can call a local HTML file, this is the replacement of the --url option made to run a local decoy in a mop.

 --ngrok In this option, you can enter a token to execute it at the time of a process.  This would replace the token saved in the settings.

 --version You can see the mop version number.

 - Update option used to update to the latest version of the mop.

 --help Used to view all the previous options, from the executable.









Follow us for more information... 

1 comment:

How to Install files and the database in MAMP Server.mp4

  Download now   Enjoy! Follow us for more...