diff --git a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md index e1a49104e..b0434a762 100644 --- a/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md +++ b/src/pentesting-cloud/aws-security/aws-unauthenticated-enum-access/README.md @@ -23,8 +23,6 @@ There are several services in AWS that could be configured giving some kind of a - [**DocumentDB Unauthenticated Enum**](aws-documentdb-enum/index.html) - [**DynamoDB Unauthenticated Access**](aws-dynamodb-unauthenticated-access/index.html) - [**EC2 Unauthenticated Enum**](aws-ec2-unauthenticated-enum/index.html) -- [**EC2 Unauthenticated Enum**](aws-ecr-unauthenticated-enum/index.html) -- [**ECS Unauthenticated Enum**](aws-ecs-unauthenticated-enum/index.html) - [**Elastic Beanstalk Unauthenticated Enum**](aws-elastic-beanstalk-unauthenticated-enum/index.html) - [**Elasticsearch Unauthenticated Enum**](aws-elasticsearch-unauthenticated-enum/index.html) - [**IAM Unauthenticated Enum**](aws-iam-and-sts-unauthenticated-enum/index.html)