Updating the README file. - amiexpose - PoC on locating sensitive/private data in public AWS AMI's.
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
---
(DIR) commit c64c376c22e9f515ebedb6de9aab95cac7979dfe
(DIR) parent 1c53db9fa62d4d2ce4ed306aaf294e41a23152a5
(HTM) Author: Jay Scott <me@jay.scot>
Date: Fri, 27 Oct 2017 21:56:11 +0100
Updating the README file.
Diffstat:
A README | 15 +++++++++++++++
D README.md | 30 ------------------------------
2 files changed, 15 insertions(+), 30 deletions(-)
---
(DIR) diff --git a/README b/README
@@ -0,0 +1,15 @@
+
+|> ami_expose
+
+
+This tool allows you to search AWS AMIs in all regions for certain
+keywords. Make sure you have a valid set of aws keys.
+
+usage:
+
+ $ python3 -m venv venv/
+ $ . venv/bin/activate
+
+ $ pip install --editable .
+
+ $ ami_expose search --query YourString
(DIR) diff --git a/README.md b/README.md
@@ -1,30 +0,0 @@
-
-## Overview
-
-Search AWS AMIs on **all** regions for certain keywords.
-
-[](https://asciinema.org/a/144619)
-
-## Development
-
-
- $ python3 -m venv venv/
- $ . venv/bin/activate
-
-## Build
-
- $ pip install --editable .
-
-## Run
-
-make sure you have a valid **AWS_SECRET_KEY** and **AWS_SECRET_ACCESS_KEY** set.
-
- $ ami_expose search --query YourString
-
-## Todo
-
- - Define regions to search.
- - Use regions from a Boto query.
- - Launch a micro EC2 instance with a AMI ID.
-
-