diff --git a/.github/attack-report.png b/.github/attack-report.png
new file mode 100644
index 000000000..5ba45e9fb
Binary files /dev/null and b/.github/attack-report.png differ
diff --git a/.github/map-full.png b/.github/map-full.png
index faa1b7832..92902a221 100644
Binary files a/.github/map-full.png and b/.github/map-full.png differ
diff --git a/.github/security-report.png b/.github/security-report.png
new file mode 100644
index 000000000..54a30b13f
Binary files /dev/null and b/.github/security-report.png differ
diff --git a/.github/zero-trust-report.png b/.github/zero-trust-report.png
new file mode 100644
index 000000000..18a0ff703
Binary files /dev/null and b/.github/zero-trust-report.png differ
diff --git a/README.md b/README.md
index 83fd878ad..bf9768459 100644
--- a/README.md
+++ b/README.md
@@ -13,10 +13,6 @@ Welcome to the Infection Monkey!
The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server.
-
-
-
-
The Infection Monkey is comprised of two parts:
* **Monkey** - A tool which infects other machines and propagates to them.
@@ -24,6 +20,20 @@ The Infection Monkey is comprised of two parts:
To read more about the Monkey, visit [infectionmonkey.com](https://infectionmonkey.com).
+## Screenshots
+
+### Map
+
+
+### Security report
+
+
+### Zero trust report
+
+
+### ATT&CK report
+
+
## Main Features
The Infection Monkey uses the following techniques and exploits to propagate to other machines.
@@ -40,6 +50,8 @@ The Infection Monkey uses the following techniques and exploits to propagate to
* Conficker
* SambaCry
* Elastic Search (CVE-2015-1427)
+ * Weblogic server
+ * and more
## Setup
Check out the [Setup](https://github.com/guardicore/monkey/wiki/setup) page in the Wiki or a quick getting [started guide](https://www.guardicore.com/infectionmonkey/wt/).