mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-07-02 04:52:11 +00:00
Update README.md
This commit is contained in:
parent
09c0279eb7
commit
c87a290f82
1 changed files with 6 additions and 6 deletions
12
README.md
12
README.md
|
@ -28,17 +28,17 @@
|
||||||
### 1.1 Features and Benefits 💡
|
### 1.1 Features and Benefits 💡
|
||||||
T-Pot provides several key features that make it a powerful tool for cybersecurity professionals and researchers:
|
T-Pot provides several key features that make it a powerful tool for cybersecurity professionals and researchers:
|
||||||
|
|
||||||
- **$${\color{red}Comprehensive\ Honeypot\ Integration}$$**: T-Pot combines over 20 honeypots, each designed to capture different types of malicious activity. This integration allows for monitoring and analyzing a wide variety of attack vectors.
|
- $${\color{red}Comprehensive\ Honeypot\ Integration}$$: T-Pot combines over 20 honeypots, each designed to capture different types of malicious activity. This integration allows for monitoring and analyzing a wide variety of attack vectors.
|
||||||
|
|
||||||
- $${\color{orange}**Elastic Stack Integration**}$$: The platform includes the **ELK stack** (Elasticsearch, Logstash, and Kibana), facilitating data collection, analysis, and visualization. This integration offers powerful tools for real-time threat intelligence.
|
- $${\color{orange}Elastic\ Stack\ Integration}$$: The platform includes the **ELK stack** (Elasticsearch, Logstash, and Kibana), facilitating data collection, analysis, and visualization. This integration offers powerful tools for real-time threat intelligence.
|
||||||
|
|
||||||
- $${\color{yellow}**Docker and Docker Compose**}$$: Using Docker and Docker Compose, T-Pot simplifies deployment and management. Each honeypot runs in its own container, ensuring isolation and ease of maintenance.
|
- $${\color{yellow}Docker\ and\ Docker\ Compose}$$: Using Docker and Docker Compose, T-Pot simplifies deployment and management. Each honeypot runs in its own container, ensuring isolation and ease of maintenance.
|
||||||
|
|
||||||
- $${\color{green}**Advanced Visualization Tools**}$$: T-Pot provides tools like **CyberChef**, **Elasticvue**, and a real-time attack map, making it easy to interpret and understand the data collected by the honeypots.
|
- $${\color{green}Advanced\ Visualization\ Tools}$$: T-Pot provides tools like **CyberChef**, **Elasticvue**, and a real-time attack map, making it easy to interpret and understand the data collected by the honeypots.
|
||||||
|
|
||||||
- $${\color{blue}**Scalability and Flexibility**}$$: T-Pot can be deployed on multiple Linux distributions, macOS, and Windows (with limited functionality). It can run on physical hardware, virtual machines, or cloud environments like AWS.
|
- $${\color{blue}Scalability\ and\ Flexibility}$$: T-Pot can be deployed on multiple Linux distributions, macOS, and Windows (with limited functionality). It can run on physical hardware, virtual machines, or cloud environments like AWS.
|
||||||
|
|
||||||
- $${\color{purple}**Community Data Sharing**}$$: By default, T-Pot sends data to the **Sicherheitstacho** community backend, contributing to collective threat intelligence. This feature can be disabled if needed.
|
- $${\color{purple}Community\ Data\ Sharing}$$: By default, T-Pot sends data to the **Sicherheitstacho** community backend, contributing to collective threat intelligence. This feature can be disabled if needed.
|
||||||
|
|
||||||
---
|
---
|
||||||
<a name="architecture"></a>
|
<a name="architecture"></a>
|
||||||
|
|
Loading…
Reference in a new issue