Sunday, May 18, 2025
HomespywareTrape -Tool to Track anyone on the Internet and to Perform real-world...

Trape -Tool to Track anyone on the Internet and to Perform real-world Attacks

Published on

SIEM as a Service

Follow Us on Google News

Trape is the python based script to track anyone on the Internet and to perform real-world attacks on the browser of a victim. Its a URL based payload should be sent to your victims on the internet and able to do phishing attack, recognizes the other tabs or sessions of victims browser, URL Redirection, sending pop-up messages.

In this Kali Linux Tutorial, we show you how to use Trapeto track anyone on the internet and to perform real-world attacks.

Attacker Machine

  • Download the Trape Tool Here
  • Execute command: python trape.py -u  <Cloning URL> <Port> 80

NOTE: For Security reasons, localhost is used to demonstrate this attack, If you change the script to your Ip it will become a real-world attack.Please don’t do, this article is provided for educational purpose only.

- Advertisement - Google News

Victims to fall

  • Here I have cloned google.com successfully.
  • Above figure Illustrated, Three Parameters: Lure, Control panel, and Access Key
  • Lure for the victim’s Link: This URL http://127.0.0.1:80/google.com is exact URL to be sent to victims.
  • Control Panel Link: This URL http://127.0.0.1:80/s7452cb is the attacker’s console to monitor victims activities.
  • Access Key: This combination of letters and numbers 63c24e1b3e20e80fac1ba162 are passcode to access console and monitor victim.

Attackers Console – Trape

  • Victim visits the URL which provided earlier.This is what happens !!! See Figure provided below
  • This shows your victim have clicked your Link.Now its time to play with a browser.

Victims Geolocation

  • Information gathered about victims current location, CPU architecture, operating system, browser and more.

Victims Browser Sessions:-

  • Now Trape has detected victims is using Twitter in another tab.

Browser Hook up

  • Above Image, bottom tabs show browser-based attackers.Here I have clone amazon.com and suddenly victims browser changes to the Amazon login page.
  • In this way you can try other tabs for URL redirection, browser pop-ups, sending the malicious file to victims.

So, this article is proposed to understand phishing attack, continues pop-ups on malicious site, site redirection and finally protect you from this kind of attacks.Never click an URL if you think its malicious.

Also Read Net Creds-Sniff out Username and Password of users in your Network

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

NSO Group Ordered to Pay $168 Million to WhatsApp in US Spyware Verdict

A federal jury in California has ordered Israeli spyware maker NSO Group to pay...

New Android Spyware Tricks Users by Demanding Passwords for Uninstallation

A newly identified Android spyware app is elevating its tactics to remain hidden and...

Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals

The once-shadowy realm of Pegasus spyware has breached new frontiers, with forensic analyses revealing...