Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems.
This tool is intended to raise awareness about cybersecurity threats and help users understand the importance of security measures like 2FA and password management.
git clone https://github.com/davenisc/thief_raccoon.git
cd thief_raccoon
2. Install python venv
apt install python3.11-venv
3. Create venv:
python -m venv raccoon_venv
source raccoon_venv/bin/activate
4. Install the required libraries:
pip install -r requirements.txt
python app.py
2. Select the operating system for the phishing simulation:After running the script, you will be presented with a menu to select the operating system. Enter the number corresponding to the OS you want to simulate.
3. Access the phishing page:If you are on the same local network (LAN), open your web browser and navigate. If you want to make the phishing page accessible over the internet, use ngrok.
Download ngrok from ngrok.com and follow the installation instructions for your operating system.
After running the above command, ngrok will provide you with a public URL. Share this URL with your test subjects to access the phishing page over the internet.
For more information click here.
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…