Login
Download
Skill UI
Browse and discover
9167+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Total
9167
skills
Default
Newest
Most Downloaded
Dark Web Threat Monitoring
performing-dark-web-monitoring-for-threats
mukul975/Anthropic-Cybersecurity-Skills
449
Performs dark web monitoring by crawling Tor services, forums, and paste sites to detect leaked credentials, breaches, and threat discussions, enabling security teams to validate controls and respond to emerging attacks.
View Details
Deception Technology Deployment
performing-deception-technology-deployment
mukul975/Anthropic-Cybersecurity-Skills
55
Deploys deception technology such as honeypots, honeytokens, Canary devices, and decoy documents across critical segments to alert SOC teams when attackers bypass perimeter defenses and attempt lateral movement, credential abuse, or internal reconnaissance.
View Details
Directory Traversal Testing
performing-directory-traversal-testing
mukul975/Anthropic-Cybersecurity-Skills
157
Provides step-by-step practices for testers to probe file path parameters, fuzz traversal payloads, and leverage tools (Burp, ffuf, dotdotpwn) to detect and escalate path traversal or LFI/RFI flaws.
View Details
Disk Forensics Investigation
performing-disk-forensics-investigation
mukul975/Anthropic-Cybersecurity-Skills
500
Performs disk forensics investigations through imaging, filesystem analysis, artifact recovery, and timeline reconstruction to support incident response and legal evidence needs on compromised storage.
View Details
DMARC Enforcement Rollout
performing-dmarc-policy-enforcement-rollout
mukul975/Anthropic-Cybersecurity-Skills
294
Guide to execute a phased DMARC rollout from monitoring (p=none) through quarantine to reject, ensuring every legitimate sender is authenticated before blocking unauthorized mail through SPF/DKIM configuration, report analysis, and ongoing maintenance.
View Details
DNS Enumeration Zone Transfer
performing-dns-enumeration-and-zone-transfer
mukul975/Anthropic-Cybersecurity-Skills
267
Walks through authorized reconnaissance to enumerate DNS records, attempt zone transfers, brute-force subdomains, and map infrastructure so you can identify misconfigurations and exposed assets before targeting services or mail servers.
View Details
DNS Tunneling Detection
performing-dns-tunneling-detection
mukul975/Anthropic-Cybersecurity-Skills
73
Monitors DNS traffic using entropy, query-length, TXT volume, and subdomain cardinality analysis to surface covert channels during incident response or proactive security assessments.
View Details
Docker Bench Security Audit
performing-docker-bench-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
209
Run Docker Bench for Security to automate CIS-aligned audits of host settings, daemon configs, images, runtime, and remediation steps, helping ops teams validate Docker deployments before production and during incident response.
View Details
Dynamic Android Analysis
performing-dynamic-analysis-of-android-app
mukul975/Anthropic-Cybersecurity-Skills
369
Analyzes Android applications at runtime with Frida, Objection, and ADB to hook sensitive methods, observe decrypted data, bypass anti-debug/root checks, and monitor live network traffic during penetration tests or runtime debugging.
View Details
Interactive ANY.RUN Malware Analysis
performing-dynamic-analysis-with-any-run
mukul975/Anthropic-Cybersecurity-Skills
472
Use the ANY.RUN cloud sandbox to perform interactive dynamic malware analysis, interact with prompts, capture process trees, network activity, and export IOCs plus ATT&CK mappings for team reporting.
View Details
Endpoint Forensics Investigation
performing-endpoint-forensics-investigation
mukul975/Anthropic-Cybersecurity-Skills
282
Performs endpoint digital forensics by capturing memory and disk images, analyzing artifacts, and rebuilding timelines to support incident investigations and legal evidence collection.
View Details
Endpoint Vulnerability Remediation
performing-endpoint-vulnerability-remediation
mukul975/Anthropic-Cybersecurity-Skills
74
Automates prioritizing CVEs by risk, orchestrating patch and configuration changes through WSUS/SCCM/Intune, handling zero-day mitigations, and validating fixes to keep endpoints compliant with SLAs.
View Details
Prev
1
2
3
...
477
478
479
480
481
482
483
...
762
763
764
Next
Language
简体中文
English