From b64c479036c668f84d8b0ef803f817cd3b7b00c4 Mon Sep 17 00:00:00 2001 From: Mustafa Issabayev <48990804+issabayevmk@users.noreply.github.com> Date: Wed, 29 May 2024 11:30:40 +0200 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 80ad770..d5f756f 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # AWS Event Names ## Overview -The AWS Event Names Generator is a Python-based utility inspired by [TryTryAgain](https://github.com/TryTryAgain/aws-iam-actions-list) and designed to monitor changes in AWS Events, particularly focused on AWS IAM actions. When changes are detected, it automatically updates the repository with the latest all aws events list and security-important events list. This tool is particularly useful for maintaining up-to-date information on AWS event names and security-critical events. Security-critical events are listed in 'security_events.py' file and based on [this](https://github.com/HackTricks-wiki/hacktricks-cloud/tree/master/pentesting-cloud/aws-security), [this](https://www.gorillastack.com/news/important-aws-cloudtrail-security-events-tracking), common security sense and my personal experience. Any suggestions and comments are welcome! +The AWS Event Names Generator is a Python-based utility inspired by [TryTryAgain](https://github.com/TryTryAgain/aws-iam-actions-list) and designed to monitor changes in AWS Events, particularly focused on AWS IAM actions. When changes are detected, it automatically updates the repository with the latest all aws events list and security-important events list. This tool is particularly useful for maintaining up-to-date information on AWS event names and security-critical events. Security-critical events are listed in '[security_events.py](security_events.py)' file and based on [this](https://github.com/HackTricks-wiki/hacktricks-cloud/tree/master/pentesting-cloud/aws-security), [this](https://www.gorillastack.com/news/important-aws-cloudtrail-security-events-tracking), common security sense and my personal experience. Any suggestions and comments are welcome! ## Features - **Automated Monitoring**: Periodically checks 'https://awspolicygen.s3.amazonaws.com/policygen.html' for updates.