diff --git a/README.md b/README.md
index 87a1bf2d..8bf0a365 100644
--- a/README.md
+++ b/README.md
@@ -1,4 +1,16 @@
-
+
+
+
+
+
+
+ Website
+ |
+ Download
+ |
+ Web Interface
+
+
[](https://pypi.org/project/flare-capa)
[](https://github.com/mandiant/capa/releases)
@@ -7,6 +19,11 @@
[](https://github.com/mandiant/capa/releases)
[](LICENSE.txt)
+
+
+
+---
+
capa detects capabilities in executable files.
You run it against a PE, ELF, .NET module, shellcode file, or a sandbox report and it tells you what it thinks the program can do.
For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate.