-
Notifications
You must be signed in to change notification settings - Fork 357
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Updated readme with release information.
- Loading branch information
Showing
1 changed file
with
28 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,28 @@ | ||
# flare-fakenet-ng | ||
FakeNet-NG | ||
______ _ ________ _ _ ______ _______ _ _ _____ | ||
| ____/\ | |/ / ____| \ | | ____|__ __| | \ | |/ ____| | ||
| |__ / \ | ' /| |__ | \| | |__ | |______| \| | | __ | ||
| __/ /\ \ | < | __| | . ` | __| | |______| . ` | | |_ | | ||
| | / ____ \| . \| |____| |\ | |____ | | | |\ | |__| | | ||
|_|/_/ \_\_|\_\______|_| \_|______| |_| |_| \_|\_____| | ||
|
||
D O C U M E N T A T I O N | ||
|
||
FakeNet-NG is a next generation dynamic network analysis tool for malware | ||
analysts and penetration testers. It is open source and designed for the latest | ||
versions of Windows. FakeNet-NG is based on the excellent Fakenet tool developed | ||
by Andrew Honig and Michael Sikorski. | ||
|
||
The tool allows you to intercept and redirect all or specific network traffic | ||
while simulating legitimate network services. Using FakeNet-NG, malware analysts | ||
can quickly identify malware’s functionality and capture network signatures. | ||
Penetration testers and bug hunters will find FakeNet-NG’s configurable | ||
interception engine and modular framework highly useful when testing | ||
application’s specific functionality and prototyping PoCs. | ||
|
||
Release | ||
======== | ||
|
||
FakeNet-NG will be released during BlackHat 2016. Come visit our BlackHat | ||
Arsenal booth for a demo and a presentation of using FakeNet-NG for | ||
malware analysis and presentation at the Arsenal Theater on Wednesday, | ||
August 3rd. |