Skip to content
Related Articles

Related Articles

Improve Article

Trape – Free GUI Based Phishing or Tracking Tool

  • Difficulty Level : Medium
  • Last Updated : 18 Jul, 2021

Trape is a tool written in Python which can be used to lure the victim in phishing or redirecting him to another website etc. So when a victim gets lure into the phishing attack, the tool captures the victim’s IP address, location, and sessions, etc. The captured results can be seen in the dashboard in a web browser. It can also be said that it is an OSINT research tool, which allows people to track and execute social engineering attacks in real-time.

Features of Trape:

  • Easy to use.
  • Traces the path between you and the target.
  • Easy to install.
  • It can manage social engineering attacks in the target’s browser.

Installation of Trape:

First clone the tool from the Github repo using the following commands.

git clone https://github.com/boxug/trape.git

Change directory by,

cd trape

Now we need to install some requirements before running trape.

pip install -r requirements.txt

Fig 1: Cloning Trape from GitHub Repository.

Usages of Trape:

Run the tool by entering python trape.py -h to check the options it provides.



Fig 2: Trape tool.

Enter the URL on which you want the victim to be redirected when he clicks on it say, we want the victim to be redirected to google.com. So the command will be:

python trape.py -u https://google.com -p 8080.

Fig 3: Waiting for victim to click on the url.

In the meantime, open the control panel by copying the control panel link in your web browser and sign in with the access key you have been provided.

Fig 4: Control Panel.

Now in the dashboard, we can see, that the victim has clicked on the URL and we can see his public IP, what browser he is using. Click on details on the bottom right to know other things about the victim like his location etc.

FIg 5: Victim’s Report.

Here we can see both the public IP and the local IP of the victim, his operating system, browser, which country and city he resides in.

FIg 6: Victim’s detailed information.

We can also perform social engineering attacks using trape tools like we can generate an alert.

Fig 7: Alert generated.

We can send a file.

Fig 8: Sending file to victim.

We can also redirect him to a phishing page.

Fig 9: Victim redirected to phishing page.

My Personal Notes arrow_drop_up
Recommended Articles
Page :