Login
Download
Skill UI
Browse and discover
6058+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
CTI
, found
2320
results
Default
Newest
Most Downloaded
ScoutSuite AWS Enumeration
performing-aws-account-enumeration-with-scout-suite
mukul975/Anthropic-Cybersecurity-Skills
69
ScoutSuite runs agentless queries against AWS APIs to enumerate resources, highlight misconfigurations, and output interactive HTML reports so teams can prioritize remediation and integrate scans into CI/CD pipelines.
View Details
Bandwidth Throttling Simulation
performing-bandwidth-throttling-attack-simulation
mukul975/Anthropic-Cybersecurity-Skills
78
Simulates bandwidth throttling and degradation using tc, iperf3, and Scapy within authorized environments to stress-test QoS controls, application resilience, and monitoring detection of manipulatively shaped traffic.
View Details
Blind SSRF Exploitation Guide
performing-blind-ssrf-exploitation
mukul975/Anthropic-Cybersecurity-Skills
194
Step-by-step methodology for detecting and exploiting blind Server-Side Request Forgery vulnerabilities using out-of-band callbacks, timing analysis, internal scanning, metadata access, and filter bypass techniques during web security assessments.
View Details
Clickjacking Attack Testing
performing-clickjacking-attack-test
mukul975/Anthropic-Cybersecurity-Skills
288
Guides authorized testers through assessing clickjacking risks by checking frame protections, hosting iframe proofs-of-concept, and crafting overlay attacks to validate X-Frame-Options/CSP defenses for sensitive web flows.
View Details
Container Escape Detection
performing-container-escape-detection
mukul975/Anthropic-Cybersecurity-Skills
449
Analyzes Kubernetes pod specs to flag privileged containers, dangerous capabilities, host namespace sharing, writable hostPath mounts, and Docker socket exposures, letting security teams audit escape vectors or investigate incidents.
View Details
Container Image Hardening
performing-container-image-hardening
mukul975/Anthropic-Cybersecurity-Skills
452
Guides hardening container images by minimizing attack surface, using multi-stage builds, non-root users, read-only roots, and CIS Docker Benchmark checks to deliver secure images for production.
View Details
CSP Bypass Techniques
performing-content-security-policy-bypass
mukul975/Anthropic-Cybersecurity-Skills
316
Guides security testers through analyzing Content Security Policies and exploiting weak directives, JSONP endpoints, nonces, base-uri, and exfiltration tricks to achieve XSS even when CSP is active.
View Details
DNS Tunneling Detection
performing-dns-tunneling-detection
mukul975/Anthropic-Cybersecurity-Skills
51
Leverages entropy metrics, query length checks, TXT volume monitoring, and subdomain cardinality analysis to spot covert DNS channels during threat hunting with Scapy-based traffic inspection.
View Details
Android Dynamic Analysis
performing-dynamic-analysis-of-android-app
mukul975/Anthropic-Cybersecurity-Skills
476
Performs runtime analysis of Android apps via Frida, Objection, and ADB to monitor behavior, hook sensitive methods, alter values, and expose vulnerabilities that static checks miss during penetration testing or forensic review.
View Details
Interactive Cloud Malware Analysis
performing-dynamic-analysis-with-any-run
mukul975/Anthropic-Cybersecurity-Skills
266
Uses ANY.RUN's cloud sandbox for interactive malware hunts, letting analysts trigger dialogs, monitor process trees, capture traffic, and export behavioral evidence without local infrastructure.
View Details
Endpoint Forensics Investigation
performing-endpoint-forensics-investigation
mukul975/Anthropic-Cybersecurity-Skills
170
Guides the capture and analysis of volatile and persistent data on compromised endpoints, covering memory acquisition, disk imaging, artifact parsing, and timeline reconstruction for incident response and legal evidence.
View Details
SIEM False Positive Reduction
performing-false-positive-reduction-in-siem
mukul975/Anthropic-Cybersecurity-Skills
106
Systematically reduce SIEM false positives through rule tuning, thresholds, correlation, allowlists, and threat intelligence enrichment while validating with Atomic Red Team runs and metrics to keep SOC analysts focused on true threats.
View Details
Prev
1
2
3
...
183
184
185
186
187
188
189
...
192
193
194
Next
Language
简体中文
English