Login
Download
Skill UI
Browse and discover
6058+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Analyzing
, found
136
results
Default
Newest
Most Downloaded
Phishing Email Header Analysis
analyzing-phishing-email-headers
mukul975/Anthropic-Cybersecurity-Skills
346
Analyze email headers to uncover sender origins, routing chains, and authentication results, enabling defenders to validate legitimacy and spot phishing indicators using manual inspection and automation scripts.
View Details
PowerShell Empire Detection
analyzing-powershell-empire-artifacts
mukul975/Anthropic-Cybersecurity-Skills
217
Scans Windows Script Block and Module Logging events to spot PowerShell Empire launchers, Base64 loaders, staging URLs, user agents, and module invocations so threat hunters can flag persistence or C2 activity quickly.
View Details
PowerShell Script Block Analysis
analyzing-powershell-script-block-logging
mukul975/Anthropic-Cybersecurity-Skills
347
Parses PowerShell Event ID 4104 logs from EVTX files to rebuild script blocks, run entropy and pattern checks, and flag obfuscated commands, encoded payloads, download cradles, and AMSI bypass attempts for security response workflows.
View Details
Ransomware Encryption Analysis
analyzing-ransomware-encryption-mechanisms
mukul975/Anthropic-Cybersecurity-Skills
86
Analyzes ransomware encryption algorithms, key management, and file routines to assess decryption feasibility, highlight weaknesses, and guide forensic recovery or decryptor development for known ransomware families.
View Details
Leak Site Intelligence
analyzing-ransomware-leak-site-intelligence
mukul975/Anthropic-Cybersecurity-Skills
427
Collects, parses, and charts ransomware leak site postings to track victim disclosures, group tactics, and sector risk so analysts can prioritize proactive defenses using public feeds and osint-safe collection practices.
View Details
Ransomware Network Detection
analyzing-ransomware-network-indicators
mukul975/Anthropic-Cybersecurity-Skills
355
Analyze Zeek conn.log or NetFlow data to detect ransomware beaconing, TOR exit node use, high outbound flows, and DNS anomalies, then score risks and map findings to MITRE ATT&CK for reporting.
View Details
Supply Chain Malware Analysis
analyzing-supply-chain-malware-artifacts
mukul975/Anthropic-Cybersecurity-Skills
436
Investigate supply chain attack artifacts by comparing trojanized binaries with legitimate versions, spotting injected code or import changes, verifying signatures, and reconstructing build pipelines to assess intrusion scope and block future compromises.
View Details
MITRE ATT&CK TTP Mapping
analyzing-threat-actor-ttps-with-mitre-attack
mukul975/Anthropic-Cybersecurity-Skills
257
Map threat actors to the MITRE ATT&CK framework, build ATT&CK Navigator technique coverage layers, identify detection gaps, and link observed IOCs to adversary tactics across Enterprise, Mobile, and ICS matrices for actionable reporting.
View Details
Mapping APT TTPs With Navigator
analyzing-threat-actor-ttps-with-mitre-navigator
mukul975/Anthropic-Cybersecurity-Skills
128
Programmatically maps APT group tactics, techniques, and procedures to MITRE ATT&CK via attackcti and the ATT&CK Navigator, generating layer JSON files, overlaying detection coverage, and sharing visualizations for defense teams.
View Details
Analyzing Threat Landscape
analyzing-threat-landscape-with-misp
mukul975/Anthropic-Cybersecurity-Skills
140
Use PyMISP to query MISP events, compute IOC type breakdowns, highlight top threat actors, MITRE techniques, and galaxy clusters, and produce temporal trend reports to help security teams understand the evolving threat landscape.
View Details
TLS Transparency Log Monitoring
analyzing-tls-certificate-transparency-logs
mukul975/Anthropic-Cybersecurity-Skills
146
Queries Certificate Transparency logs via crt.sh and pycrtsh to catch phishing domains, unauthorized certificates, and typosquatting variations, flagging unexpected issuers and wildcard certificates for proactive brand-impersonation defense.
View Details
DNSTwist Typosquatting Analysis
analyzing-typosquatting-domains-with-dnstwist
mukul975/Anthropic-Cybersecurity-Skills
51
Use DNSTwist to generate domain permutations, resolve DNS records, and compare fuzzy/visual hashes so security teams can spot registered typosquatting and homograph phishing targets before they harm the brand.
View Details
Prev
1
2
3
...
6
7
8
9
10
11
12
Next
Language
简体中文
English