[Nulled] » Information security » Trape: Link for PC management
March 13 2022

Trape: Link for PC management

Trape: Link for PC management
Note: Information for research, training, or auditing. Use for mercenary purposes is punishable by law.

 

Trape is a recognition tool that allows you to track people, the information you can get is very detailed.

We want to teach the world this, because large Internet companies can control you by getting information outside of your IP address.

Some advantages

* One of the most attractive features is remote session recognition. You can know where a person is logged in, remotely. This happens via a bypass done according to the same Origin Policy (SOP)

• Currently, you can try everything starting from the web interface. (Console, becomes a preview of logs and actions)

* Registration of victims, requests among other data received in real time.

• If you get more information from the person at the computer, you can create a more direct and sophisticated attack. trape was used at some point to track down criminals and find out their behavior.

• You can do phishing attacks in real time

* Simple attacks

• Mapping

* Important Details

* Getting credentials

* Open Source Integration (OSINT)

Recognizes sessions of the following services
Facebook
Twitter
VK
Reddit
Gmail
tumblr
Instagram
Github
Bitbucket
Dropbox
Spotify
PayPal
Amazon
Foursquare (new)
Airbnb (new)
Hackernews (new)
Slack (new)
How to use
Download the tool first

Warning! You are not allowed to view this text.

Usage example
Example: python trape.py -url http://example.com -port 8080

• In the -url option you have to put a bait, there may be a news page, an article that serves as a presentation page.

• In the -port option, you just put the port you want to run it on

• Do you like to follow your people? Everything is possible with Trape

• Do you want to perform phishing attacks? Everything is possible with Trape

• In the Files folder located on the path: / static / files, you add files with the extension.exe or download files sent to the victim.





Information

Visitors who are in the group Guests they can't download files.
Log in to the site under your login and password or if you are a new user go through the process registrations on the website.

Comments:

This publication has no comments yet. You can be the first!

Information the publication:

Related News

14 March 2022
Information security»,Anonymity on the web
What is a keylogger?

What is a keylogger? A keylogger is a program that registers user actions on a computer and logs the following

Read more
14 February 2022
WebSite support»,Rules
Privacy Policy

This Privacy Policy of Personal Data (hereinafter referred to as the Privacy Policy) applies to all information

Read more
13 March 2022
Information security»,Protection and hacking
Hacking websites through

Hacking websites through Kali Linux Attention! Information for research, training, or auditing. Use for mercenary

Read more
14 March 2022
Information security»,Anonymity on the web
Anonymity on the

Anonymity on the Internet for beginners Every hour thousands of users search and find a wide variety of

Read more
13 March 2022
Information security»,Protection and hacking
TheFatRat: Massive

TheFatRat: Massive Exploit Tool Thefatrat is a massive tool that allows you to bypass most antivirus programs. A

Read more

Information

Users of 🆅🅸🆂🅸🆃🅾🆁 are not allowed to comment this publication.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    November 2024    »
MonTueWedThuFriSatSun
 123
45678910
11121314151617
18192021222324
252627282930 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +4 Total articles 6747
  • +13 Comments 4083
  • +28 Users : 5818