ENNAENNA

FakeNet-NG

Apache-2.0

🧬 Reverse Engineering · Python

FakeNet-NG is a dynamic network analysis tool designed for malware analysis on Windows and Linux. It intercepts and redirects all network traffic to local listeners that simulate real internet services (HTTP, HTTPS, DNS, SMTP, FTP, IRC, and custom protocols). This allows analysts to observe malware network behavior without allowing actual internet connectivity, capturing C2 communications, download URLs, exfiltration attempts, and protocol patterns. FakeNet-NG supports SSL interception, custom response scripts, and integration with other analysis tools. It operates at the network driver level, catching traffic from all processes simultaneously.

2.1kstars
380forks
82issues
Updated 25d ago
+I use this

Installation

$ pip install fakenet-ng

Use Cases

  • Capturing malware C2 traffic in isolated environments
  • Simulating internet services for dynamic malware analysis
  • Observing DNS queries and HTTP callbacks from samples
  • Safe detonation of malware without internet access

Tags

malware-analysisnetwork-simulationdynamic-analysisc2-capturemandiantfakenet-nggsoc-2026mandiant-flaretraffic-redirection

Community Reviews

More in Reverse Engineering