GuardDuty events sent via CloudWatch rules and SNS emails are ugly.
It is possible to improve them using inputTransformer.
guardduty-event-target.tf
shows an example usage.
SELECT eventtime, | |
eventname, | |
requestparameters, | |
awsregion, | |
eventsource, | |
resources | |
FROM cloudtrail_662651605507 | |
WHERE year = '2019' | |
AND month IN ('7', '8', '9', '10', '11') | |
AND eventsource = 's3.amazonaws.com' |
SELECT eventtime, | |
eventname, | |
requestparameters, | |
awsregion, | |
eventsource, | |
resources | |
FROM cloudtrail_662651605507 | |
WHERE year = '2019' | |
AND month IN ('7', '8', '9', '10', '11') | |
AND eventsource = 'lambda.amazonaws.com' |
GuardDuty events sent via CloudWatch rules and SNS emails are ugly.
It is possible to improve them using inputTransformer.
guardduty-event-target.tf
shows an example usage.
import boto3 | |
session = boto3.Session(profile_name='ariancho') | |
s3_client = session.client('s3') | |
display_name = s3_client.list_buckets()['Owner']['DisplayName'] | |
print(display_name) | |
for bucket in s3_client.list_buckets()['Buckets']: | |
print(s3_client.get_bucket_acl(Bucket=bucket['Name'])['Owner']['DisplayName']) |
import os | |
import sys | |
import time | |
import random | |
import subprocess | |
FNULL = open(os.devnull, 'w') | |
env = {'HTTPS_PROXY': 'http://localhost:8080/'} | |
cmd = ('aws --region us-east-1 --no-verify-ssl --profile=andres-root s3api delete-object' |
import timeit | |
import lz4.frame | |
import lzf | |
import zlib | |
#import snappy | |
import os | |
from timeit import Timer | |
DATA = open("test.py", "rb").read() | |
DLEN = len(DATA) |
As an application security expert I use Atom to read source code. I would like to be able to have a plugin with features that will help me identify vulnerabilities.
Add annotations to the source code: Select a few lines of code, right click, "Add annotation", text box appears, user types comments on the source code, clicks "Save". All annotations can be seen in a tab. If the code has annotations then it is highlighted differently (change background color)
The plugin implements methods for searching for XSS, SQL injection, etc. The plugin adds a menu
How does Oraclize work? How do they use crypto to guarantee that they are providing unmodified results for the HTTP queries?
### Keybase proof | |
I hereby claim: | |
* I am andresriancho on github. | |
* I am andresriancho (https://keybase.io/andresriancho) on keybase. | |
* I have a public key whose fingerprint is 0FA5 D462 EA05 CBBF EAEE 1F14 E0ED B201 A7B2 7B69 | |
To claim this, I am signing this object: |
using System; | |
using System.Linq; | |
using System.Collections.Generic; | |
class app { | |
static void Main() { | |
string[] names = { "Burke", "Connor", "Frank", | |
"Everett", "Albert", "George", | |
"Harris", "David" }; |