Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systems. This tool is intended to raise awareness about cybersecurity threats and help users understand the importance of security measures like 2FA and password management.
Phishing simulation for Windows 10, Windows 11, Windows XP, Windows Server, Ubuntu, Ubuntu Server, and macOS.Capture user credentials for educational demonstrations.Customizable login screens that mimic real operating systems.Full-screen mode to enhance the phishing simulation.
Python 3.xpip (Python package installer)ngrok (for exposing the local server to the internet)
Clone the repository:
cd thief_raccoon
Install python venv
Create venv:
source raccoon_venv/bin/activate
Install the required libraries:
Usage
Run the main script:
Select the operating system for the phishing simulation:
After running the script, you will be presented with a menu to select the operating system. Enter the number corresponding to the OS you want to simulate.
Access the phishing page:
If you are on the same local network (LAN), open your web browser and navigate to http://127.0.0.1:5000.
If you want to make the phishing page accessible over the internet, use ngrok.
Using ngrok
Download and install ngrok
Download ngrok from ngrok.com and follow the installation instructions for your operating system.
Expose your local server to the internet:
Get the public URL:
After running the above command, ngrok will provide you with a public URL. Share this URL with your test subjects to access the phishing page over the internet.
How to install Ngrok on Linux?
Install ngrok via Apt with the following command:
| sudo tee /etc/apt/trusted.gpg.d/ngrok.asc >/dev/null
&& echo “deb https://ngrok-agent.s3.amazonaws.com buster main“
| sudo tee /etc/apt/sources.list.d/ngrok.list
&& sudo apt update
&& sudo apt install ngrok
Run the following command to add your authtoken to the default ngrok.yml
Deploy your app online
Put your app online at ephemeral domain Forwarding to your upstream service. For example, if it is listening on port http://localhost:8080, run:
Example
Run the main script:
Select Windows 11 from the menu:
1. Windows 10
2. Windows 11
3. Windows XP
4. Windows Server
5. Ubuntu
6. Ubuntu Server
7. macOS
Enter the number of your choice: 2
Access the phishing page:
Open your browser and go to http://127.0.0.1:5000 or the ngrok public URL.
Disclaimer
This tool is intended for educational purposes only. The author is not responsible for any misuse of this tool. Always obtain explicit permission from the owner of the system before conducting any phishing tests.
License
This project is licensed under the MIT License. See the LICENSE file for details.
ScreenShots
Credits
Developer: @davenisc Web: https://davenisc.com