Skip to content

Commit deffc31

Browse files
System AdministratorSystem Administrator
authored andcommitted
trape v2.0 (stable)
1 parent 8169a6f commit deffc31

58 files changed

Lines changed: 4637 additions & 3055 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.DS_Store

8 KB
Binary file not shown.

README.md

Lines changed: 104 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -1,51 +1,77 @@
1-
trape (community)
1+
2+
trape (stable) v2.0
23
========
34

45
People tracker on the Internet: Learn to track the world, to avoid being traced.
56

67
---
7-
Trape is a recognition tool that allows you to **track people**, the information you can get is very detailed. We want to teach the world through this, as large Internet companies could monitor you, obtaining information beyond your IP.
8+
Trape is a **OSINT** analysis and research tool, which allows people to track and execute intelligent **social engineering** attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain **confidential information** such as the status of sessions of their websites or services and control over their users through the browser, without them knowing, but It evolves with the aim of helping **government** organizations, companies and **researchers** to track the cybercriminals.
89

9-
![--trape header](https://i.imgur.com/Y0wAPO9.png)
10+
![--trape header](https://i.imgur.com/2ycpXEj.png)
1011

1112
Some benefits
1213
-----------
13-
* One of its most enticing functions is the remote recognition of sessions. You can know where a person has logged in, remotely. This occurs through a Bypass made to the **Same Origin Policy** (**SOP**)
14-
* Currently you can try everything from a web interface. (**The console, becomes a preview of the logs and actions**)
15-
* Registration of victims, requests among other data are obtained in real time.
16-
* If you get more information from a person behind a computer, you can generate a more direct and sophisticated attack. Trape was used at some point to track down criminals and know their **behavior**.
17-
* You can do real time phishing attacks
18-
* Simple hooking attacks
19-
* Mapping
20-
* Important details of the objective
21-
* Capturing credentials
22-
* Open Source Intelligence (**OSINT**)
23-
24-
Recognizes the sessions of the following services
14+
* **LOCATOR OPTIMIZATION:** Trace the path between you and the target you're tracking. Each time you make a move, the path will be updated, by means of this the location of the target is obtained silently through a bypass made in the browsers, allowing you not to skip the location request permit on the victim's side , objective or person and at the same time maintain a precision of **99%** in the locator.
15+
16+
![](https://lh3.googleusercontent.com/qwq4LzzLTdFGwsGd8C3c9gxbDaN191s7lnvz75y0trwIMUGSaIu22QyBRgwKXxRwLBC5HGekBJLw9qgD5lnxgszcFVqJ24RVqv3q_T3HzD6wJeQU6oY4VVF8QT6Y83hstqD4C020)
17+
* **APPROACH:** When you're close to the target, Trape will tell you.
18+
19+
![](https://lh4.googleusercontent.com/NFnVGLoDF2BmM_N56w8Vf6cnyg1WWIIKgGC1MeBTKXxcIynMDfC1ZSu43ftoiYnwcBb2gjpVdS4y0zm5K7XAzvXf7bPIt5ZrWQCEq9eQuN8KL-SRPOtBgIZL53AWkJjwhC4gJUcG)
20+
21+
* **REST API:** Generates an API (random or custom), and through this you can control and monitor other Web sites on the Internet remotely, getting the traffic of all visitors.
22+
23+
![](https://lh6.googleusercontent.com/DtQiYYLoL9di3LPcSSTCZ3AuVMlQaNcDkBdv_fZFX7rztjg_epWmIaA2AlGsWCr5Mwr2nVfLcsg1I5PXEcx87ErLS8JaruvRsEUIkScydXA3JhvbsmJov7qxbKooGgD5u32kmBHW)
24+
25+
* **PROCESS HOOKS:** Manages social engineering attacks or processes in the target's browser.
26+
27+
--- **SEVERAL:** You can issue a phishing attack of any domain or service in real time as well as send malicious files to compromise the device of a target.
28+
29+
30+
--- **INJECT JS:** You keep the JavaScript code running free in real time, so you can manage the execution of a **keylogger** or your own custom functions in JS which will be reflected in the target's browser.
31+
32+
--- **SPEECH:** A process of audio creation is maintained which is played in the browser of the objective, by means of this you can execute personalized messages in different voices with languages in Spanish and English.
33+
34+
35+
36+
37+
* **PUBLIC NETWORK TUNNEL:** Trape has its own **API** that is linked to [ngrok.com](https://ngrok.com) to allow the automatic management of public network tunnels; By this you can publish your content of trape server executed locally to the Internet, to manage hooks or public attacks.
38+
39+
![](https://lh5.googleusercontent.com/_f3zaCeZya_5AKaCoaPexyJVpNA7fiRqYQ9WBRiGLsHcx1W5V61V-VENeIRF2QbqvpenyOJ1AYyreTmOr2MWbf9PYu4qXF-tbYWi7qp6ZWeOwvoG3LYUdpjp3pAK9mIAQZzPJwAO)
40+
41+
42+
* **CLICK ATTACK TO GET CREDENTIALS:** Automatically obtains the target credentials, recognizing your connection availability on a social network or Internet service.
43+
44+
![](https://lh4.googleusercontent.com/IN8xWfHjGPRQ__-QwTXebG-087m4JzDIVFWtSlUtrnRpDn2d0U1cnQdNGqLQZA35-fneej1iTpkxgHZCq_pWZLlCd1SmyLZ-WJ5Juj2KbtyNbX4jI1oLUtqupxieH91mX65_ZmHy)
45+
46+
* **NETWORK:** You can get information about the user's network.
47+
48+
--- **SPEED:** Viewing the target's network speed. (Ping, download, upload, type connection)
49+
50+
--- **HOSTS OR DEVICES:** Here you can get a scan of all the devices that are connected in the target network automatically.
51+
52+
![](https://lh3.googleusercontent.com/gkOWunWn7ge5yJt00lMBN_7GwSUxrAQV2y64ysyrjmD-vz_lO3bu6UkRjPJF8OljxyMTNlWVA9W8gVU3U0iI3RrECNNkr7H44Lz6z5Zj3-bA_hDF5TnTSoV_6584qFvuLkmShTQD)
53+
54+
55+
* **PROFILE:** Brief summary of the target's behavior and important additional information about your device.
56+
57+
--- **GPU**
58+
--- **ENERGY**
59+
60+
30-session recognition
2561
-------
26-
* Facebook
27-
* Twitter
28-
* VK
29-
* Reddit
30-
* Gmail
31-
* tumblr
32-
* Instagram
33-
* Github
34-
* Bitbucket
35-
* Dropbox
36-
* Spotify
37-
* PayPal
38-
* Amazon
39-
* Foursquare (*new*)
40-
* Airbnb (*new*)
41-
* Hackernews (*new*)
42-
* Slack (*new*)
62+
Session recognition is one of trape most interesting attractions, since you as a researcher can know remotely what service the target is connected to.
63+
64+
![](https://lh6.googleusercontent.com/IFxIh7Eemr63kycj2eBzJYvevCzLH5DkQGWUKzPx_Okn4WoExPl0LR7Qj-cSc0WF0rs9Ew6DJMwcyirZd0kdfLpdrqQ2700P_xdxW7wpZ7K6OWi8pluLKivHtU45HD4VtyM0lLwh)
65+
66+
* **USABILITY:** You can delete logs and view alerts for each process or action you run against each target.
67+
68+
![](https://lh4.googleusercontent.com/dXx1lRG2z-ZlSIlQyTx_ra7sbkgKG2jeqGjIt86GebFiAaZyFDA4vy3QBLACd-1wOz4zdSIARWvo3hK2mEvrSJ6VPDSiOZgMLB4rUYXKDHrone0xIB3bwhAKPnsJUcuKW9xf_-sG)
4369

4470
How to use it
4571
-------
4672
First unload the tool.
4773
```
48-
git clone https://github.com/boxug/trape.git
74+
git clone https://github.com/jofpin/trape.git
4975
cd trape
5076
python trape.py -h
5177
```
@@ -58,52 +84,76 @@ Example of execution
5884
```
5985
Example: python trape.py --url http://example.com --port 8080
6086
```
61-
* In the option **--url** you must put the lure, can be a news page, an article something that serves as a presentation page.
62-
* In the **--port** option you just put the port where you want it to run
63-
* Do you like to monitor your people? Everything is possible with Trape
64-
* Do you want to perform phishing attacks? Everything is possible with Trape
65-
* In the Files directory, located on the path: **/static/files** here you add the files with .exe extension or download files sent to the victim.
6687

67-
Here are some simple videos to use:
68-
-------
69-
**Spanish**: https://www.youtube.com/watch?v=ptyuCQmMKiQ
88+
**HELP AND OPTIONS**
89+
```
90+
user:~$ python trape.py --help
91+
usage: python trape.py -u <> -p <> [-h] [-v] [-u URL] [-p PORT]
92+
[-ak ACCESSKEY] [-l LOCAL]
93+
[--update] [-n] [-ic INJC]
94+
95+
optional arguments:
96+
-h, --help show this help message and exit
97+
-v, --version show program's version number and exit
98+
-u URL, --url URL Put the web page url to clone
99+
-p PORT, --port PORT Insert your port
100+
-ak ACCESSKEY, --accesskey ACCESSKEY
101+
Insert your custom key access
102+
-l LOCAL, --local LOCAL
103+
Insert your home file
104+
-n, --ngrok Insert your ngrok Authtoken
105+
-ic INJC, --injectcode INJC
106+
Insert your custom REST API path
107+
```
108+
109+
**--url** In this option you add the URL you use to clone Live, which works as a decoy.
110+
111+
**--port** Here you insert the port, where you are going to run the **trape server**.
112+
113+
**--accesskey** You enter a custom key for the **trape panel**, if you do not insert it will generate an **automatic key**.
70114

71-
**English**: https://www.youtube.com/watch?v=FdwyIZhUx3Y
115+
**--injectcode** trape contains a **REST API** to play anywhere, using this option you can customize the name of the file to include, if it does not, generates a random name allusive to a token.
116+
117+
**--local** Using this option you can call a local **HTML file**, this is the replacement of the **--url** option made to run a local lure in trape.
118+
119+
**--ngrok** In this option you can enter a token, to run at the time of a process. This would replace the token saved in configurations.
120+
121+
**--version** You can see the version number of trape.
122+
123+
**--help** It is used to see all the above options, from the executable.
72124

73-
At an international security event in Colombia, called **DragonJAR Security Conference** 2017, a demonstration was made before the launch. You can watch the video here: [https://www.youtube.com/watch?v=vStSEsznxgE](https://www.youtube.com/watch?v=vStSEsznxgE)
74125

75126
Disclaimer
76127
-------
77128
This tool has been published educational purposes in order to teach people how bad guys could track them or monitor them or obtain information from their credentials, we are not responsible for the use or the scope that may have the People through this project.
78129

79130
We are totally convinced that if we teach how vulnerable things are, we can make the Internet a safer place.
80131

81-
Developers or participants
132+
Developer
82133
-------
83-
The following people are part of the core of development and research in
84-
Boxug.
85-
86134
This development and others, the participants will be mentioned with name, Twitter and charge.
87135

88-
* Jose Pino - [@jofpin](https://twitter.com/jofpin) - (**Founder at [boxug](https://boxug.com)**)
136+
* **CREATOR**
89137

90-
Standard Version
138+
--- Jose Pino - [@jofpin](https://twitter.com/jofpin) - (**Security Researcher**)
139+
140+
141+
Donations
91142
-------
92-
Yes, we also have a standard version with more sophisticated features. If you would like to get the standard version or request contact us at [email protected]
143+
This is a project made with a lot of motivation to collaborate in the computer security community, if you liked the features. I invite you to make a donation in the following directions.
93144

94-
Purchase here: https://trape.co
145+
**BITCOIN:** 36RouFnp6wEf4qu8QzUDJGVKoZ2Ja1ZSyW
146+
**ETHEREUM:** 0x6b9c69F0126c8A817c3A7296b2af80EF2e8B2d65
95147

96148
Happy hacking!
97149
-------
98150
I invite you, if you use this tool helps to share, collaborate. Let's make the Internet a safer place, let's report.
99151

100-
-------------
101-
102152

103153
## License
104154

105155
The content of this project itself is licensed under the [Creative Commons Attribution 3.0 license](http://creativecommons.org/licenses/by/3.0/us/deed.en_US), and the underlying source code used to format and display that content is licensed under the [MIT license](http://opensource.org/licenses/mit-license.php).
106156

107-
Copyright, 2017 by [boxug](https://boxug.com) - First Your Security
157+
Copyright, 2018 by [Jose Pino](https://twitter.com/jofpin)
108158

109159
-------------

core/__init__.py

100644100755
File mode changed.

core/colorama/.DS_Store

6 KB
Binary file not shown.

core/colorama/__init__.py

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Copyright Jonathan Hartley 2013. BSD 3-Clause license, see LICENSE file.
2+
from .initialise import init, deinit, reinit, colorama_text
3+
from .ansi import Fore, Back, Style, Cursor
4+
from .ansitowin32 import AnsiToWin32
5+
6+
__version__ = '0.3.7'
7+

core/colorama/ansi.py

Lines changed: 102 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,102 @@
1+
# Copyright Jonathan Hartley 2013. BSD 3-Clause license, see LICENSE file.
2+
'''
3+
This module generates ANSI character codes to printing colors to terminals.
4+
See: http://en.wikipedia.org/wiki/ANSI_escape_code
5+
'''
6+
7+
CSI = '\033['
8+
OSC = '\033]'
9+
BEL = '\007'
10+
11+
12+
def code_to_chars(code):
13+
return CSI + str(code) + 'm'
14+
15+
def set_title(title):
16+
return OSC + '2;' + title + BEL
17+
18+
def clear_screen(mode=2):
19+
return CSI + str(mode) + 'J'
20+
21+
def clear_line(mode=2):
22+
return CSI + str(mode) + 'K'
23+
24+
25+
class AnsiCodes(object):
26+
def __init__(self):
27+
# the subclasses declare class attributes which are numbers.
28+
# Upon instantiation we define instance attributes, which are the same
29+
# as the class attributes but wrapped with the ANSI escape sequence
30+
for name in dir(self):
31+
if not name.startswith('_'):
32+
value = getattr(self, name)
33+
setattr(self, name, code_to_chars(value))
34+
35+
36+
class AnsiCursor(object):
37+
def UP(self, n=1):
38+
return CSI + str(n) + 'A'
39+
def DOWN(self, n=1):
40+
return CSI + str(n) + 'B'
41+
def FORWARD(self, n=1):
42+
return CSI + str(n) + 'C'
43+
def BACK(self, n=1):
44+
return CSI + str(n) + 'D'
45+
def POS(self, x=1, y=1):
46+
return CSI + str(y) + ';' + str(x) + 'H'
47+
48+
49+
class AnsiFore(AnsiCodes):
50+
BLACK = 30
51+
RED = 31
52+
GREEN = 32
53+
YELLOW = 33
54+
BLUE = 34
55+
MAGENTA = 35
56+
CYAN = 36
57+
WHITE = 37
58+
RESET = 39
59+
60+
# These are fairly well supported, but not part of the standard.
61+
LIGHTBLACK_EX = 90
62+
LIGHTRED_EX = 91
63+
LIGHTGREEN_EX = 92
64+
LIGHTYELLOW_EX = 93
65+
LIGHTBLUE_EX = 94
66+
LIGHTMAGENTA_EX = 95
67+
LIGHTCYAN_EX = 96
68+
LIGHTWHITE_EX = 97
69+
70+
71+
class AnsiBack(AnsiCodes):
72+
BLACK = 40
73+
RED = 41
74+
GREEN = 42
75+
YELLOW = 43
76+
BLUE = 44
77+
MAGENTA = 45
78+
CYAN = 46
79+
WHITE = 47
80+
RESET = 49
81+
82+
# These are fairly well supported, but not part of the standard.
83+
LIGHTBLACK_EX = 100
84+
LIGHTRED_EX = 101
85+
LIGHTGREEN_EX = 102
86+
LIGHTYELLOW_EX = 103
87+
LIGHTBLUE_EX = 104
88+
LIGHTMAGENTA_EX = 105
89+
LIGHTCYAN_EX = 106
90+
LIGHTWHITE_EX = 107
91+
92+
93+
class AnsiStyle(AnsiCodes):
94+
BRIGHT = 1
95+
DIM = 2
96+
NORMAL = 22
97+
RESET_ALL = 0
98+
99+
Fore = AnsiFore()
100+
Back = AnsiBack()
101+
Style = AnsiStyle()
102+
Cursor = AnsiCursor()

0 commit comments

Comments
 (0)