Skip to content

Commit

Permalink
Updated readme with release information.
Browse files Browse the repository at this point in the history
  • Loading branch information
iphelix committed Jul 11, 2016
1 parent 056a5ad commit 45b1762
Showing 1 changed file with 28 additions and 2 deletions.
30 changes: 28 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,28 @@
# flare-fakenet-ng
FakeNet-NG
______ _ ________ _ _ ______ _______ _ _ _____
| ____/\ | |/ / ____| \ | | ____|__ __| | \ | |/ ____|
| |__ / \ | ' /| |__ | \| | |__ | |______| \| | | __
| __/ /\ \ | < | __| | . ` | __| | |______| . ` | | |_ |
| | / ____ \| . \| |____| |\ | |____ | | | |\ | |__| |
|_|/_/ \_\_|\_\______|_| \_|______| |_| |_| \_|\_____|

D O C U M E N T A T I O N

FakeNet-NG is a next generation dynamic network analysis tool for malware
analysts and penetration testers. It is open source and designed for the latest
versions of Windows. FakeNet-NG is based on the excellent Fakenet tool developed
by Andrew Honig and Michael Sikorski.

The tool allows you to intercept and redirect all or specific network traffic
while simulating legitimate network services. Using FakeNet-NG, malware analysts
can quickly identify malware’s functionality and capture network signatures.
Penetration testers and bug hunters will find FakeNet-NG’s configurable
interception engine and modular framework highly useful when testing
application’s specific functionality and prototyping PoCs.

Release
========

FakeNet-NG will be released during BlackHat 2016. Come visit our BlackHat
Arsenal booth for a demo and a presentation of using FakeNet-NG for
malware analysis and presentation at the Arsenal Theater on Wednesday,
August 3rd.

0 comments on commit 45b1762

Please sign in to comment.