From c5e27d3dcf0d2efe6958b9474e47023370757f95 Mon Sep 17 00:00:00 2001 From: Domenico Del Giudice <114437746+domedg@users.noreply.github.com> Date: Sun, 2 Mar 2025 11:20:22 +0100 Subject: [PATCH] Update README.md --- README.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index 6a10c956..63a4e799 100644 --- a/README.md +++ b/README.md @@ -27,18 +27,18 @@ ### 1.1 Features and Benefits 💡 T-Pot provides several key features that make it a powerful tool for cybersecurity professionals and researchers: -$${\color{red}Comprehensive Honeypot Integratio}$$ -- **Comprehensive Honeypot Integration**: T-Pot combines over 20 honeypots, each designed to capture different types of malicious activity. This integration allows for monitoring and analyzing a wide variety of attack vectors. - -- **Elastic Stack Integration**: The platform includes the **ELK stack** (Elasticsearch, Logstash, and Kibana), facilitating data collection, analysis, and visualization. This integration offers powerful tools for real-time threat intelligence. -- **Docker and Docker Compose**: Using Docker and Docker Compose, T-Pot simplifies deployment and management. Each honeypot runs in its own container, ensuring isolation and ease of maintenance. +- $${\color{red}**Comprehensive Honeypot Integration**}$$: T-Pot combines over 20 honeypots, each designed to capture different types of malicious activity. This integration allows for monitoring and analyzing a wide variety of attack vectors. + +- $${\color{orange}**Elastic Stack Integration**}$$: The platform includes the **ELK stack** (Elasticsearch, Logstash, and Kibana), facilitating data collection, analysis, and visualization. This integration offers powerful tools for real-time threat intelligence. -- **Advanced Visualization Tools**: T-Pot provides tools like **CyberChef**, **Elasticvue**, and a real-time attack map, making it easy to interpret and understand the data collected by the honeypots. +- $${\color{yellow}**Docker and Docker Compose**}$$: Using Docker and Docker Compose, T-Pot simplifies deployment and management. Each honeypot runs in its own container, ensuring isolation and ease of maintenance. -- **Scalability and Flexibility**: T-Pot can be deployed on multiple Linux distributions, macOS, and Windows (with limited functionality). It can run on physical hardware, virtual machines, or cloud environments like AWS. +- $${\color{green}**Advanced Visualization Tools**}$$: T-Pot provides tools like **CyberChef**, **Elasticvue**, and a real-time attack map, making it easy to interpret and understand the data collected by the honeypots. -- **Community Data Sharing**: By default, T-Pot sends data to the **Sicherheitstacho** community backend, contributing to collective threat intelligence. This feature can be disabled if needed. +- $${\color{blue}**Scalability and Flexibility**}$$: T-Pot can be deployed on multiple Linux distributions, macOS, and Windows (with limited functionality). It can run on physical hardware, virtual machines, or cloud environments like AWS. + +- $${\color{purple}**Community Data Sharing**}$$: By default, T-Pot sends data to the **Sicherheitstacho** community backend, contributing to collective threat intelligence. This feature can be disabled if needed. ---