diff --git a/README.md b/README.md
index 6d6a443..fa302d2 100644
--- a/README.md
+++ b/README.md
@@ -1,3 +1,13 @@
+>
+___ ____ _ _____ _ _ ______ _
+| \/ (_) | |_ _(_) | | ___ \ | |
+| . . |_| | ___ __ ___ | | _| | __ | |_/ / ___ __ _ ___| |_
+| |\/| | | |/ / '__/ _ \| | | | |/ / | ___ \/ _ \/ _` / __| __|
+| | | | | <| | | (_) | | | | < | |_/ / __/ (_| \__ \ |_
+\_| |_/_|_|\_\_| \___/\_/ |_|_|\_\ \____/ \___|\__,_|___/\__|
+
+
+
# Mikrotik Beast tool
Mass MikroTik WinBox Exploitation tool, CVE-2018-14847
This tool allows you to scan a range of network hosts (CIDR) against the CVE-2018-14847 winbox exploit.
@@ -5,7 +15,7 @@
# Usage
python3 mikrotikbeast.py
#
- Accepted input examples
+ Accepted input examples
Example 1: '192.168.5.0/24'
Example 2: '172.16.0.0/16'