Login
Download
Skill UI
Browse and discover
6186+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Access
, found
233
results
Default
Newest
Most Downloaded
Cloudflare Zero Trust Access
deploying-cloudflare-access-for-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
375
Guides deploying Cloudflare Access with Cloudflare Tunnel, identity providers, device posture checks, and WARP enrollment to replace VPNs for securely exposing self-hosted applications.
View Details
Deploying Prisma Access Zero Trust
deploying-palo-alto-prisma-access-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
440
Step-by-step guidance for configuring Palo Alto Networks Prisma Access SASE zero trust, covering infrastructure setup, ZTNA connectors, application policies, HIP profiles, and GlobalProtect rollout for secure remote and branch access.
View Details
Deploy Software Defined Perimeter
deploying-software-defined-perimeter
mukul975/Anthropic-Cybersecurity-Skills
499
Guides zero trust engineers through deploying the CSA v2.0 software-defined perimeter, covering SPA, mTLS, controller and gateway configuration, policy-driven access, and validation to keep applications invisible until authorized.
View Details
API Enumeration Detection
detecting-api-enumeration-attacks
mukul975/Anthropic-Cybersecurity-Skills
322
Monitors sequential ID access, UUID probes, and tampered parameters across API logs to flag BOLA/IDOR enumeration attempts, providing SOC analysts with structured signals for detection rule tuning.
View Details
AWS CloudTrail Anomaly Detection
detecting-aws-cloudtrail-anomalies
mukul975/Anthropic-Cybersecurity-Skills
244
Detect unusual AWS CloudTrail API activity via boto3, statistical baselining, and behavioral analysis to flag credential compromise, privilege escalation, and unauthorized resource access for SOC analysts or threat hunters.
View Details
Container Escape Detection
detecting-container-escape-attempts
mukul975/Anthropic-Cybersecurity-Skills
75
Detects container escape attempts via runtime monitoring using Falco, Sysdig, and custom audit rules. Monitors syscalls, mounts, kernel modules, and Docker socket accesses so SOC teams can hunt escapes and validate detection coverage.
View Details
Falco Container Escape Detection
detecting-container-escape-with-falco-rules
mukul975/Anthropic-Cybersecurity-Skills
210
Falco container escape detection rules monitor syscalls, file writes, namespace access, and privileged launches to catch breakout attempts across Kubernetes or standalone containerd/Docker hosts, helping SOC analysts hunt escapes and validate monitoring coverage.
View Details
Insider Threat Detection
detecting-insider-threat-behaviors
mukul975/Anthropic-Cybersecurity-Skills
359
Detects insider threat behaviors by hunting for unusual data access, privilege abuse, mass downloads, and resignation-linked exfiltration across EDR, SIEM, and intelligence sources to guide incident response actions.
View Details
Kerberoasting Detection Guide
detecting-kerberoasting-attacks
mukul975/Anthropic-Cybersecurity-Skills
60
Documented workflow for hunting Kerberoasting activity by correlating SIEM and EDR telemetry, validating findings, and reporting observations so defenders can proactively detect Credential Access abuse.
View Details
Mimikatz Execution Detection
detecting-mimikatz-execution-patterns
mukul975/Anthropic-Cybersecurity-Skills
343
Detect execution patterns of Mimikatz by correlating command-line signatures, LSASS access anomalies, binary indicators, and in-memory modules across EDR and SIEM telemetry, supporting proactive threat hunting and incident response.
View Details
Detecting OAuth Token Theft
detecting-oauth-token-theft
mukul975/Anthropic-Cybersecurity-Skills
273
Guides analysts through detecting and responding to OAuth token theft, replay, and session hijacking in Microsoft Entra ID, covering conditional access, token protection, and log queries for cloud identity threats.
View Details
Detecting S3 Exfiltration
detecting-s3-data-exfiltration-attempts
mukul975/Anthropic-Cybersecurity-Skills
295
Detect S3 data exfiltration by correlating CloudTrail data events, GuardDuty findings, Macie alerts, and access patterns to flag bulk downloads or cross-account transfers.
View Details
Prev
1
2
3
...
10
11
12
13
14
15
16
...
18
19
20
Next
Language
简体中文
English