From c7c164f153757aa56a751165145db834bfe5a8b5 Mon Sep 17 00:00:00 2001
From: evilsocket <evilsocket@gmail.com>
Date: Tue, 9 Jan 2018 14:45:49 +0100
Subject: [PATCH] docs: readme update

---
 README.md | 23 ++++++++++++++---------
 1 file changed, 14 insertions(+), 9 deletions(-)

diff --git a/README.md b/README.md
index 8e8435b3..b5e33f9d 100644
--- a/README.md
+++ b/README.md
@@ -166,7 +166,7 @@ For instance you can view a list of declared variables with `get *` and set new
                   get NAME : Get the value of variable NAME, use * for all.
             set NAME VALUE : Set the VALUE of variable NAME.
 
-    ARP Spoofer [not active]
+    ARP Spoofer
     Keep spoofing selected hosts on the network.
 
               arp.spoof on : Start ARP spoofer.
@@ -177,14 +177,19 @@ For instance you can view a list of declared variables with `get *` and set new
          arp.spoof.targets : IP addresses to spoof. (default=<entire subnet>)
 
 
-    Events Stream [active]
+    Events Stream
     Print events as a continuous stream.
 
           events.stream on : Start events stream.
          events.stream off : Stop events stream.
               events.clear : Clear events stream.
 
-    HTTP Proxy [not active]
+      Parameters
+
+      events.stream.filter : If filled, filter events by this prefix type. (default=)
+
+
+    HTTP Proxy
     A full featured HTTP proxy that can be used to inject malicious contents into webpages, all HTTP traffic will be redirected to it.
 
              http.proxy on : Start HTTP proxy.
@@ -198,7 +203,7 @@ For instance you can view a list of declared variables with `get *` and set new
          http.proxy.script : Path of a proxy JS script. (default=)
 
 
-    Network Prober [not active]
+    Network Prober
     Keep probing for new hosts on the network by sending dummy UDP packets to every possible IP on the subnet.
 
               net.probe on : Start network hosts probing in background.
@@ -209,14 +214,14 @@ For instance you can view a list of declared variables with `get *` and set new
         net.probe.throttle : If greater than 0, probe packets will be throttled by this value in milliseconds. (default=10)
 
 
-    Network Recon [not active]
+    Network Recon
     Read periodically the ARP cache in order to monitor for new hosts on the network.
 
               net.recon on : Start network hosts discovery.
              net.recon off : Stop network hosts discovery.
                   net.show : Show current hosts list.
 
-    Network Sniffer [not active]
+    Network Sniffer
     Sniff packets from the network.
 
          net.sniffer stats : Print sniffer session configuration and statistics.
@@ -225,14 +230,14 @@ For instance you can view a list of declared variables with `get *` and set new
 
       Parameters
 
+        net.sniffer.regexp : If filled, only packets matching this regular expression will be considered. (default=)
+        net.sniffer.output : If set, the sniffer will write captured packets to this file. (default=)
        net.sniffer.verbose : Print captured packets to screen. (default=true)
          net.sniffer.local : If true it will consider packets from/to this computer, otherwise it will skip them. (default=false)
         net.sniffer.filter : BPF filter for the sniffer. (default=not arp)
-        net.sniffer.regexp : If filled, only packets matching this regular expression will be considered. (default=)
-        net.sniffer.output : If set, the sniffer will write captured packets to this file. (default=)
 
 
-    REST API [not active]
+    REST API
     Expose a RESTful API.
 
                api.rest on : Start REST API server.