Login
Download
Skill UI
Browse and discover
5970+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
DNS
, found
32
results
Default
Newest
Most Downloaded
Dnsfilter Automation Workflow
dnsfilter-automation
ComposioHQ/awesome-claude-skills
100
Automate Dnsfilter operations by discovering current Rube MCP schemas, checking toolkit connections, and orchestrating RUBE_MULTI_EXECUTE_TOOL calls with schema-compliant arguments while always reusing sessions and memory placeholders.
View Details
Nextdns Automation Workflow
nextdns-automation
ComposioHQ/awesome-claude-skills
130
Guide for automating Nextdns operations through Composio’s toolkit on Rube MCP, covering discovery, connection checks, execution, and schema-sensitive workflows before every run.
View Details
Route53 Record Manager
route53-record-manager
jeremylongshore/claude-code-plugins-plus-skills
458
Automates guidance for AWS Route53 record tasks by offering best-practice patterns, code snippets, configuration checks, and validation to help operators manage DNS records, routing policies, and automation workflows.
View Details
Vercel Automation Toolkit
vercel-automation
davepoon/buildwithclaude
236
Automates Vercel operations through Composio’s Rube MCP toolkit, covering deployment inspections, creation, env var updates, DNS, and project configuration via guided workflows.
View Details
Cobalt Strike Profile Analysis
analyzing-cobaltstrike-malleable-c2-profiles
mukul975/Anthropic-Cybersecurity-Skills
170
Parse Cobalt Strike Malleable C2 profiles with dissect.cobaltstrike and pyMalleableC2 to extract HTTP indicators, jitter/sleep settings, DNS and injection configs, then craft Suricata/Snort signatures for detection.
View Details
DNS Exfiltration Detection
analyzing-dns-logs-for-exfiltration
mukul975/Anthropic-Cybersecurity-Skills
420
Scans DNS query logs within SIEM platforms to flag data exfiltration by spotting suspicious tunneling subdomains, high-entropy DGA-style domains, and abnormal query volumes, helping SOC teams uncover DNS-based threats evading standard controls.
View Details
Malware Covert Channel Detection
analyzing-network-covert-channels-in-malware
mukul975/Anthropic-Cybersecurity-Skills
364
Analyzes malware covert channels such as DNS tunneling, ICMP exfiltration, steganographic HTTP, and protocol abuse via Python/PCAP inspection so incident responders can flag suspicious domains and flows during threat hunting.
View Details
Scapy Network Packet Analysis
analyzing-network-packets-with-scapy
mukul975/Anthropic-Cybersecurity-Skills
482
Build skill to craft, send, sniff, and dissect packets with Scapy for protocol analysis, reconnaissance, anomaly detection, and structured JSON reporting during authorized security tests.
View Details
Ransomware Network Detection
analyzing-ransomware-network-indicators
mukul975/Anthropic-Cybersecurity-Skills
355
Analyze Zeek conn.log or NetFlow data to detect ransomware beaconing, TOR exit node use, high outbound flows, and DNS anomalies, then score risks and map findings to MITRE ATT&CK for reporting.
View Details
DNSTwist Typosquatting Analysis
analyzing-typosquatting-domains-with-dnstwist
mukul975/Anthropic-Cybersecurity-Skills
51
Use DNSTwist to generate domain permutations, resolve DNS records, and compare fuzzy/visual hashes so security teams can spot registered typosquatting and homograph phishing targets before they harm the brand.
View Details
Sliver C2 Infrastructure
building-c2-infrastructure-with-sliver-framework
mukul975/Anthropic-Cybersecurity-Skills
195
Guide to deploying and hardening a resilient Sliver command-and-control infrastructure, covering team server provisioning, HTTPS/mTLS/DNS/WireGuard listeners, redirectors, implant generation, and post-exploitation operations for authorized red-team engagements.
View Details
OSINT External Reconnaissance
conducting-external-reconnaissance-with-osint
mukul975/Anthropic-Cybersecurity-Skills
265
Uses OSINT techniques to map an organization’s external attack surface without hitting any systems directly; aggregates DNS, certificate, breach, social media, and cloud data for passive reconnaissance before penetration tests or red team engagements.
View Details
1
2
3
Next
Language
简体中文
English