analyzing-linux-audit-logs-for-intrusion
mukul975/Anthropic-Cybersecurity-Skills
Uses auditd, ausearch, and aureport to spot intrusion attempts, unauthorized access, privilege escalation, suspicious processes, and tampering on Linux hosts, aiding incident response teams with timelines and compliance reporting.