WebTrap Logo

WebTrap

0
Free
Visit Website

This project is designed to create deceptive webpages to deceive and redirect attackers away from real websites. The deceptive webpages are generated by cloning real websites, specifically their login pages. For further reading material on the tool development, please visit our blog. Getting Started The project is composed of two tools: - Web Cloner: Responsible for cloning real websites and creating the deceptive webpage. - Deceptive Web server: Responsible for serving the cloned webpages, and reporting to a syslog server upon requests. Operating System The project was designed and tested on an Ubuntu 16.04 machine. Prerequisites - pip install requests - apt install gir1.2-webkit2-3.0 python-gi python-gi-cairo python3-gi python3-gi-cairo gir1.2-gtk-3.0 How to use How to use the Web Cloner: usage: WebCloner.py [-h] [-o OUTPUT_DIRECTORY] website_url positional arguments: website_url: The URL path to the web page you desire to clone optional arguments: -h, --help: show this help message and exit -o OUTPUT_DIRECTORY, --output-directory OUTPUT_DIRECTORY: Setting the output directory for the cloned webpage How to run the Deceptive web server: usage: TrapServer.py [-h] [--webroot-directory W

FEATURES

ALTERNATIVES

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.

Unified repository for Microsoft Sentinel and Microsoft 365 Defender containing security content, detections, queries, playbooks, and resources to secure environments and hunt for threats.

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

A simple, self-contained modular host-based IOC scanner for incident responders.

msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.