Login
Download
Skill UI
Browse and discover
6170+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
C2
, found
37
results
Default
Newest
Most Downloaded
SOC2 Audit Prep Assistant
assisting-with-soc2-audit-preparation
jeremylongshore/claude-code-plugins-plus-skills
340
Automates SOC2 audit preparation by invoking the soc2-audit-helper plugin to gather evidence, assess controls, and flag compliance gaps, streamlining readiness reporting and remediation planning.
View Details
Wallet Security Auditor
auditing-wallet-security
jeremylongshore/claude-code-plugins-plus-skills
431
Scans ERC20 approvals, interactions, and history to calculate wallet risk scores, flag suspicious behaviors, and generate revocation recommendations for crypto security reviews.
View Details
Wallet Security Auditor
auditing-wallet-security
jeremylongshore/claude-code-plugins-plus-skills
431
Scans ERC20 approvals, interactions, and history to calculate wallet risk scores, flag suspicious behaviors, and generate revocation recommendations for crypto security reviews.
View Details
Infrastructure Compliance Checker
checking-infrastructure-compliance
jeremylongshore/claude-code-plugins-plus-skills
179
Evaluates infrastructure setups against SOC2, HIPAA, and PCI-DSS, highlights violations, and recommends fixes when users request compliance checks or audit reports.
View Details
Senior SecOps Toolkit
senior-secops
alirezarezvani/claude-skills
193
Provides a Senior SecOps engineer workflow for scanning application code and dependencies, automating compliance checks across SOC2/PCI-DSS/HIPAA/GDPR, and enforcing secure development practices within audits, incident response, and CI/CD gates.
View Details
Soc2 Compliance Checker
soc2-compliance-checker
jeremylongshore/claude-code-plugins-plus-skills
230
Automated assistant for SOC2 compliance checks that guides security teams through best practices, code/configuration generation, and validation within advanced enterprise frameworks.
View Details
Token Integration Analyzer
token-integration-analyzer
trailofbits/skills
121
Analyzes token implementations and integrations with ERC20/ERC721 standards, checks 20+ weird token patterns, assesses owner privileges, contract composition, and on-chain scarcity to highlight risks before deployment.
View Details
Cobalt Strike Beacon Config
analyzing-cobalt-strike-beacon-configuration
mukul975/Anthropic-Cybersecurity-Skills
420
Extract and inspect Cobalt Strike beacon configuration from PE files or memory dumps to reveal C2 servers, malleable profiles, watermarks, and other operator tradecraft for incident response or hunting.
View Details
Cobalt Strike Profile Analysis
analyzing-cobalt-strike-malleable-profiles
mukul975/Anthropic-Cybersecurity-Skills
476
Parses Cobalt Strike malleable C2 profiles via pyMalleableC2 to pull beacon configs, HTTP communication patterns, sleep/jitter settings, and combines JARM scans for C2 detection when hunting suspected infrastructure or building IDS signatures.
View Details
Cobalt Strike Profile Analysis
analyzing-cobaltstrike-malleable-c2-profiles
mukul975/Anthropic-Cybersecurity-Skills
346
Parse and analyze Cobalt Strike Malleable C2 profiles to extract HTTP transformations, indicator data, and process behaviors, enabling SOC analysts and threat hunters to generate structured detection rules and validate monitoring coverage.
View Details
Command-and-Control Analysis
analyzing-command-and-control-communication
mukul975/Anthropic-Cybersecurity-Skills
262
Analyzes malware command-and-control (C2) communication by profiling protocols, beaconing behavior, and payload structure to inform detection, reverse engineering, and threat intelligence workflows.
View Details
DNS Exfiltration Detection
analyzing-dns-logs-for-exfiltration
mukul975/Anthropic-Cybersecurity-Skills
288
Scans DNS query logs within SIEM platforms to flag data exfiltration by spotting suspicious tunneling subdomains, high-entropy DGA-style domains, and abnormal query volumes, helping SOC teams uncover DNS-based threats evading standard controls.
View Details
1
2
3
4
Next
Language
简体中文
English