Login
Download
Skill UI
Browse and discover
6556+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
CTI
, found
2404
results
Default
Newest
Most Downloaded
NoSQL Injection Exploits
exploiting-nosql-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
156
Guides security professionals through identifying and exploiting NoSQL injection flaws in MongoDB, CouchDB and similar databases, covering authentication bypasses, blind data extraction, JavaScript injections, and tool-assisted testing during penetration tests or bug bounty work.
View Details
Prototype Pollution Exploits
exploiting-prototype-pollution-in-javascript
mukul975/Anthropic-Cybersecurity-Skills
337
Techniques and workflow to find and leverage prototype pollution bugs in JavaScript applications, covering client/server detection, gadget hunting, and payloads for XSS, RCE, and auth bypass during security testing.
View Details
Race Condition Exploitation Kit
exploiting-race-condition-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
444
Guide to using Turbo Intruder’s single-packet attack, Python threading, and Burp Suite workflows to trigger race conditions, bypass rate limits, and manipulate state-changing web transactions under controlled security testing.
View Details
SQL Injection Exploitation
exploiting-sql-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
248
Assesses web apps for SQL injection during authorized penetration tests, mapping inputs, fingerprinting databases, and exploiting manually or with sqlmap to demonstrate data theft, auth bypass, or remote code execution while validating defensive controls.
View Details
SQLmap SQL Injection Exploit
exploiting-sql-injection-with-sqlmap
mukul975/Anthropic-Cybersecurity-Skills
481
Guide for authorized penetration testers to use sqlmap for detecting, validating, and exploiting SQL injection vulnerabilities, enumerating databases, and demonstrating impact during engagements or CTFs.
View Details
Template Injection Exploitation
exploiting-template-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
200
Guides security teams through detecting and abusing server-side template injection flaws in engines like Jinja2, Twig, and Freemarker during authorized assessments, enabling remote code execution and sensitive data exposure.
View Details
Exploiting WebSocket Flaws
exploiting-websocket-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
361
Guides authenticated security assessments of WebSocket implementations by enumerating endpoints, verifying authentication, checking cross-site hijacking protections, and testing for message injection issues across real-time features.
View Details
Memory Dump Credential Extraction
extracting-credentials-from-memory-dump
mukul975/Anthropic-Cybersecurity-Skills
192
Extract credentials, hashes, tickets, and tokens from memory dumps using Volatility, Mimikatz, and pypykatz for deep incident response and compromise assessment workflows.
View Details
Malware IOC Extraction
extracting-iocs-from-malware-samples
mukul975/Anthropic-Cybersecurity-Skills
291
Extracts file, network, host, and PCAP-derived indicators from analyzed malware samples to populate blocklists, detection content, and shared threat intelligence feeds.
View Details
Production Docker Hardening
hardening-docker-containers-for-production
mukul975/Anthropic-Cybersecurity-Skills
213
Guides operators through CIS-aligned best practices to harden production Docker containers, covering daemons, images, runtime flags, and audits for a minimal attack surface and least-privilege posture.
View Details
Advanced Persistent Threat Hunting
hunting-advanced-persistent-threats
mukul975/Anthropic-Cybersecurity-Skills
185
Drives hypothesis-based hunts for Advanced Persistent Threat activity by correlating endpoint telemetry, network logs, and memory artifacts through MITRE ATT&CK tactics before documenting findings or detection rules.
View Details
Credential Stuffing Hunter
hunting-credential-stuffing-attacks
mukul975/Anthropic-Cybersecurity-Skills
483
Detects credential stuffing attacks by analyzing authentication logs for velocity anomalies, ASN diversity, password spray patterns, and geographic distribution of failed logins; useful when hunting account takeover campaigns or tuning detection rules.
View Details
Prev
1
2
3
...
173
174
175
176
177
178
179
...
199
200
201
Next
Language
简体中文
English