Internet people tracker: OSINT analysis and research tool TESTED BY the Code:
Installation and operation;
git clone https://github.com/jofpin/trape.git
cd trape
python2 -m pip install -r require.txt
python2 trape.py -h
Execution example:
> Example: python2 trape.py --url http://example.com --port 8080
Commands executed:
PROCESS HOOKS: manages attacks or social engineering processes in the browser of the target.
--- MISCELLANEOUS: You can issue a phishing attack from any domain or service in real time, as well as send malicious files to compromise a target's device.
--- INJECT JS: Keeps the JavaScript code running freely in real time, so you can manage the execution of a keylogger or your own custom functions in JS that will be reflected in the browser of the target.
--- SPEECH: an audio creation process is maintained that is reproduced in the browser of the target, through which you can execute personalized messages in different voices with languages in Spanish and English.
PUBLIC NETWORK UNTUNNEL: Trape has its own API that is linked to ngrok.com to allow automatic management of public network tunnels; Therefore, you can publish the content of your trap server that is running locally on the Internet, to manage hooks or public attacks.
- You can get information about the user's network.
--- SPEED: See the network speed of the target. (Ping, download, upload, write connection)
--- HOSTS OR DEVICES: Here you can get a scan of all the devices that are connected in the destination network automatically.
--url In this option, add the URL you want to clone, which works as a decoy.
--port Here you insert the port, where the trape server is going to run.
--accesskey You enter a custom key for the capture panel, if you do not insert it it will generate an automatic key.
--injectcode trape contains a REST API to play anywhere, with this option you can customize the name of the file to include, if it does not, it generates a random name alluding to a token.
--local Using this option you can call a local HTML file, this is the replacement of the --url option made to run a local decoy in a mop.
--ngrok In this option, you can enter a token to execute it at the time of a process. This would replace the token saved in the settings.
--version You can see the mop version number.
- Update option used to update to the latest version of the mop.
--help Used to view all the previous options, from the executable.
Follow us for more information...
Is this available for termux
ReplyDelete