Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
issabayevmk committed May 29, 2024
1 parent 05eb385 commit b64c479
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# AWS Event Names

## Overview
The AWS Event Names Generator is a Python-based utility inspired by [TryTryAgain](https://github.com/TryTryAgain/aws-iam-actions-list) and designed to monitor changes in AWS Events, particularly focused on AWS IAM actions. When changes are detected, it automatically updates the repository with the latest all aws events list and security-important events list. This tool is particularly useful for maintaining up-to-date information on AWS event names and security-critical events. Security-critical events are listed in 'security_events.py' file and based on [this](https://github.com/HackTricks-wiki/hacktricks-cloud/tree/master/pentesting-cloud/aws-security), [this](https://www.gorillastack.com/news/important-aws-cloudtrail-security-events-tracking), common security sense and my personal experience. Any suggestions and comments are welcome!
The AWS Event Names Generator is a Python-based utility inspired by [TryTryAgain](https://github.com/TryTryAgain/aws-iam-actions-list) and designed to monitor changes in AWS Events, particularly focused on AWS IAM actions. When changes are detected, it automatically updates the repository with the latest all aws events list and security-important events list. This tool is particularly useful for maintaining up-to-date information on AWS event names and security-critical events. Security-critical events are listed in '[security_events.py](security_events.py)' file and based on [this](https://github.com/HackTricks-wiki/hacktricks-cloud/tree/master/pentesting-cloud/aws-security), [this](https://www.gorillastack.com/news/important-aws-cloudtrail-security-events-tracking), common security sense and my personal experience. Any suggestions and comments are welcome!

## Features
- **Automated Monitoring**: Periodically checks 'https://awspolicygen.s3.amazonaws.com/policygen.html' for updates.
Expand Down

0 comments on commit b64c479

Please sign in to comment.