mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-07-01 20:42:11 +00:00
Update README.md
This commit is contained in:
parent
0dffac345b
commit
355e98fda4
1 changed files with 6 additions and 8 deletions
14
README.md
14
README.md
|
@ -23,23 +23,21 @@
|
|||
|
||||
---
|
||||
<a name="features-and-benefits"></a>
|
||||
```html
|
||||
### 1.1 Features and Benefits 💡
|
||||
T-Pot provides several key features that make it a powerful tool for cybersecurity professionals and researchers:
|
||||
|
||||
- <span style="color: red;">**Comprehensive Honeypot Integration**</span>: T-Pot combines over 20 honeypots, each designed to capture different types of malicious activity. This integration allows for monitoring and analyzing a wide variety of attack vectors.
|
||||
- **Comprehensive Honeypot Integration**: T-Pot combines over 20 honeypots, each designed to capture different types of malicious activity. This integration allows for monitoring and analyzing a wide variety of attack vectors.
|
||||
|
||||
- <span style="color: orange;">**Elastic Stack Integration**</span>: The platform includes the **ELK stack** (Elasticsearch, Logstash, and Kibana), facilitating data collection, analysis, and visualization. This integration offers powerful tools for real-time threat intelligence.
|
||||
- **Elastic Stack Integration**: The platform includes the **ELK stack** (Elasticsearch, Logstash, and Kibana), facilitating data collection, analysis, and visualization. This integration offers powerful tools for real-time threat intelligence.
|
||||
|
||||
- <span style="color: green;">**Docker and Docker Compose**</span>: Using Docker and Docker Compose, T-Pot simplifies deployment and management. Each honeypot runs in its own container, ensuring isolation and ease of maintenance.
|
||||
- **Docker and Docker Compose**: Using Docker and Docker Compose, T-Pot simplifies deployment and management. Each honeypot runs in its own container, ensuring isolation and ease of maintenance.
|
||||
|
||||
- <span style="color: green;">**Advanced Visualization Tools**</span>: T-Pot provides tools like <span style="color: orange;">**CyberChef**</span>, <span style="color: orange;">**Elasticvue**</span>, and a real-time attack map, making it easy to interpret and understand the data collected by the honeypots.
|
||||
- **Advanced Visualization Tools**: T-Pot provides tools like **CyberChef**, **Elasticvue**, and a real-time attack map, making it easy to interpret and understand the data collected by the honeypots.
|
||||
|
||||
- <span style="color: gray;">**Scalability and Flexibility**</span>: T-Pot can be deployed on multiple Linux distributions, macOS, and Windows (with limited functionality). It can run on physical hardware, virtual machines, or cloud environments like AWS.
|
||||
- **Scalability and Flexibility**: T-Pot can be deployed on multiple Linux distributions, macOS, and Windows (with limited functionality). It can run on physical hardware, virtual machines, or cloud environments like AWS.
|
||||
|
||||
- <span style="color: purple; font-weight: bold;">**Community Data Sharing**</span>: By default, T-Pot sends data to the <span style="color: purple; font-weight: bold;">**Sicherheitstacho**</span> community backend, contributing to collective threat intelligence. This feature can be disabled if needed.
|
||||
- **Community Data Sharing**: By default, T-Pot sends data to the **Sicherheitstacho** community backend, contributing to collective threat intelligence. This feature can be disabled if needed.
|
||||
|
||||
``
|
||||
---
|
||||
<a name="architecture"></a>
|
||||
### 1.2 Architecture 🏗️
|
||||
|
|
Loading…
Reference in a new issue