Trape – OSINT Analysis and Research Tool

0
0

There are several ways to get information about your target one of them running a remote scan and check open ports or any exposed vulnerabilities. second is becoming very common is targeted social engineering attack by verifying online services for OSINT and sending phishing attack. If you are interested in running social engineering attack you can check Trape,

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control over their users through the browser, without them knowing, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals.

Trape - OSINT Analysis and Research Tool

Trape – OSINT Analysis and Research Tool

Some of the features with this tool:

  • Location Optimization: Trace the path between you and the target you’re tracking.
  • REST API Generates an API (random or custom), and through this you can control and monitor other Web sites on the Internet remotely, getting the traffic of all visitors.
  • Process Hooks: Manages social engineering attacks or processes in the target’s browser.
  • Several: You can issue a phishing attack of any domain or service in real time as well as send malicious files to compromise the device of a target.
  • Inject JS: You keep the JavaScript code running free in real time, so you can manage the execution of a keylogger or your own custom functions in JS which will be reflected in the target’s browser.
  • Public Network Tunnel: Trape has its own API that is linked to ngrok.com to allow the automatic management of public network tunnels

This will be useful during a penetration testing to test your target with phishing and social engineering attack and see how the target will interact with the links. attack can be performed by email, social network or any communication method including phone calls.

You can read more and download the tool over here: https://github.com/jofpin/

Share