Arbazkhan4712 / Face-Recognition-Attendence-with-AWS-Rekognition-Raspberry-Pi3Links
Face Recognition Attendence with AWS Rekognition & Raspberry Pi3
☆12Updated 5 years ago
Alternatives and similar repositories for Face-Recognition-Attendence-with-AWS-Rekognition-Raspberry-Pi3
Users that are interested in Face-Recognition-Attendence-with-AWS-Rekognition-Raspberry-Pi3 are comparing it to the libraries listed below
Sorting:
- Automation and remediation bots for Dome9's (Continuous) Compliance Engine☆114Updated 4 months ago
- Scans your AWS cloud resources and generates reports. Check out free hosted version:☆281Updated 4 years ago
- A simple AWS Boto3 script to trigger EBS Snapshots using Lambda Functions🎓☆21Updated 4 years ago
- A traffic monitoring platform for analyzing human mobility patterns☆16Updated 4 years ago
- How to get started with AWS WAF and AWS Shield Advanced☆37Updated 2 years ago
- Optimizing your cost with Rightsizing Recommendations - This tool will print the Rightsizing Recommendations from your AWS Account / Orga…☆13Updated 2 years ago
- AWS Backup implementation in terraform☆14Updated 5 years ago
- This is a collection of AWS CloudFormation templates which create Lambda functions triggered by CloudWatch Events rule to evaluate AWS AP…☆53Updated 7 years ago
- Solution and deployment for recurring Security Hub Summary email to provide recipients with a proactive communication summarizing the sec…☆44Updated 2 weeks ago
- A collection of scripts & tooling that's executed from Lambda to backup your AWS Services such as Route53, EBS, RDS, EFS, etc into a S3 b…☆163Updated 2 years ago
- Tools to help automate your AWS Accounts☆101Updated last year
- A Workshop for AWS Security Hub Integration, Prioritization, and Response☆72Updated 2 years ago
- Cloud Conformity Auto Remediate☆157Updated last month
- Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.☆246Updated 4 years ago
- ☆33Updated last year
- Open source application to instantly remediate common security issues through the use of AWS Config☆219Updated 5 years ago
- Workshop exercise materials for re:Invent 2017 - SID 341: Using AWS CloudTrail Logs for Scalable, Automated Anomaly Detection☆54Updated 6 years ago
- Make a network graph of an AWS region☆86Updated 6 years ago
- SSH-Restricted deploys an SSH compliance rule (AWS Config) with auto-remediation via AWS Lambda if SSH access is public.☆30Updated 4 years ago
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆259Updated this week
- ☆39Updated 4 years ago
- The open source version of the Amazon GuardDuty documentation. You can provide feedback & requests for changes by submitting issues in th…☆22Updated 2 years ago
- aws inventory tool☆48Updated 3 years ago
- AWS CloudFormation templates for deploying Trend Micro Deep Security Manager and its underlying infrastructure.☆25Updated 2 months ago
- Monitor how many EC2 instances are running across all regions with a simple dashboard.☆32Updated 3 years ago
- Self service portal for aws workspace☆10Updated last year
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆44Updated 5 years ago
- Workshop and sample code that builders can use for experiential learning of AWS services that provide data protection. Services such as A…☆90Updated last year
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆81Updated 4 years ago
- Wazuh - Amazon AWS Cloudformation☆41Updated 2 years ago