Skip to content
View juljeanpierre's full-sized avatar
:electron:
Updates coming soon...
:electron:
Updates coming soon...

Block or report juljeanpierre

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. IAM-Role-Credentials-Exfill Public

    Automated response to GuardDuty Finding UnauthorizedAccess:IAMUser/ InstanceCredentialExfiltration.OutsideAWS

    Python

  2. MS-Teams_GuardDuty_Alert Public

    Providing Real-Time Alerting/Monitoring through ChatOps.

    Python

  3. Block_AWS_S3_SSE-C.md
    1
    # Disable Amazon S3 SSE-C Encryption 
    2
    
                  
    3
    ### When using `SSE-C encryption` the key is generated and stored outside your AWS Account (client-side). So if IAM accessKeys were compromised and the keys are associated with permissions to S3, the user could encrypt with SSE-C and hold the data ransom with the encryption key in their possession.
    4
    
                  
    5
    ![SSE-C](https://gist.github.com/user-attachments/assets/294d5f36-b903-4881-b133-2cc886bd0ed6)
  4. AWS_Inspector_Finding_Delivery_S3 Public

    This article helps you Push Inspector findings automatically to an S3 bucket after a vulnerability assessment scan has completed.

    Python 6 1

  5. Cipher_Challenge Public

    Solve the quest by locating 2 keys.

    HTML

  6. Extracting sbls from Spamhaus
    1
    import os
    2
    import urllib.request
    3
    import re
    4
    from bs4 import BeautifulSoup
    5