FakeNet-NG
Apache-2.0🧬 Reverse Engineering · Python
FakeNet-NG is a dynamic network analysis tool designed for malware analysis on Windows and Linux. It intercepts and redirects all network traffic to local listeners that simulate real internet services (HTTP, HTTPS, DNS, SMTP, FTP, IRC, and custom protocols). This allows analysts to observe malware network behavior without allowing actual internet connectivity, capturing C2 communications, download URLs, exfiltration attempts, and protocol patterns. FakeNet-NG supports SSL interception, custom response scripts, and integration with other analysis tools. It operates at the network driver level, catching traffic from all processes simultaneously.
Installation
$ pip install fakenet-ngUse Cases
- Capturing malware C2 traffic in isolated environments
- Simulating internet services for dynamic malware analysis
- Observing DNS queries and HTTP callbacks from samples
- Safe detonation of malware without internet access
Tags
Details
- Category
- 🧬 Reverse Engineering
- Language
- Python
- Repository
- mandiant/flare-fakenet-ng
- License
- Apache-2.0
- Platforms
- 🐧linux🪟windows
Links
Community Reviews
Alternatives & Comparisons
Wireshark
C/C++The world's foremost network protocol analyzer. Deep packet inspection for hundreds of protocols.
Compare FakeNet-NG vs WiresharkZeek
C++Network analysis framework (formerly Bro). Deep packet inspection, protocol analysis, and security monitoring at scale.
Compare FakeNet-NG vs ZeekMore in Reverse Engineering
dnSpy
C#.NET debugger, decompiler, and assembly editor. Inspect and modify .NET and Unity assemblies without source code.
ILSpy
C#Open-source .NET decompiler and assembly browser. Produces clean C# from compiled binaries with cross-platform support.
x64dbg
C++Open-source x64/x32 debugger for Windows. Full-featured binary debugger with plugin ecosystem for malware analysis and reverse engineering.
Detect It Easy
C++/QtBinary packer and compiler detection. Identifies compilers, linkers, packers, and protectors used to build PE, ELF, and Mach-O files.
angr
PythonBinary analysis framework. Symbolic execution, CFG recovery, and vulnerability discovery for compiled binaries in Python.
RetDec
C++Retargetable decompiler by Avast. Converts machine code back to C from x86, ARM, MIPS, and PowerPC binaries.