Login
Download
Skill UI
Browse and discover
7039+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Domain
, found
79
results
Default
Newest
Most Downloaded
SAML Azure AD Federation
building-identity-federation-with-saml-azure-ad
mukul975/Anthropic-Cybersecurity-Skills
308
Guides teams through standing up SAML 2.0 federation between on-premises AD/AD FS (or third-party IdP) and Microsoft Entra ID, covering domain conversion, certificates, claims rules, and federated SSO for cloud SaaS apps.
View Details
Full-Scope Red Teaming
conducting-full-scope-red-team-engagement
mukul975/Anthropic-Cybersecurity-Skills
252
Guides planning and executing MITRE ATT&CK-aligned red team engagements from reconnaissance through reporting, emphasizing stealthy payloads, lateral movement, defined objectives like domain dominance and data exfiltration, and the legal/prerequisite controls needed to validate detection and response readiness.
View Details
Active Directory DCSync Detection
detecting-dcsync-attack-in-active-directory
mukul975/Anthropic-Cybersecurity-Skills
353
Hunts for DCSync attacks by monitoring Active Directory replication requests, auditing Event ID 4662, correlating non-domain-controller RPC traffic, and alerting when unauthorized accounts request replication rights to detect credential theft.
View Details
DNS Query Exfiltration Detection
detecting-dns-exfiltration-with-dns-query-analysis
mukul975/Anthropic-Cybersecurity-Skills
349
Builds a passive DNS analysis pipeline that flags DNS tunneling attempts by inspecting query entropy, subdomain length, volume spikes, TXT abuses, and response payload sizes so SOCs can detect exfiltrating data hidden in DNS traffic.
View Details
DNS Exfiltration Detection with Zeek
detecting-exfiltration-over-dns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
420
Analyzes Zeek dns.log to flag DNS tunneling by computing subdomain entropy, long labels, unique counts and query volumes, scoring domains and emitting structured JSON reports for SOC investigations and monitoring validation.
View Details
AD CS ESC1 Exploit
exploiting-active-directory-certificate-services-esc1
mukul975/Anthropic-Cybersecurity-Skills
355
Exploit misconfigured Active Directory Certificate Services ESC1 templates to request certificates as privileged users, then escalate to Domain Admin during authorized red team or pentest work. Includes enumeration, certificate requests, PKINIT authentication, and follow-on domain access.
View Details
Broken Link Hijacking
exploiting-broken-link-hijacking
mukul975/Anthropic-Cybersecurity-Skills
128
Audit web apps for dead external resources, verify claimable domains/cloud assets, and validate broken-link hijacking paths to demonstrate supply-chain and subdomain takeover risks.
View Details
noPac Domain Admin Exploit
exploiting-nopac-cve-2021-42278-42287
mukul975/Anthropic-Cybersecurity-Skills
377
Exploit the noPac chain (CVE-2021-42278/42287) to elevate a standard Active Directory user to Domain Admin by spoofing machine accounts, abusing Kerberos PAC confusion, and automating the DCSync workflow during authorized red-team engagements.
View Details
Zerologon Domain Takeover
exploiting-zerologon-vulnerability-cve-2020-1472
mukul975/Anthropic-Cybersecurity-Skills
452
Automates the Zerologon (CVE-2020-1472) attack flow against Netlogon, showing scanning, exploitation, DCSync and restoration so red teams or defenders can reproduce the vulnerability, assess exposure, and validate detection logic.
View Details
Zeek DNS Tunnel Detection
hunting-for-dns-tunneling-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
353
Analyze Zeek dns.log for long queries, high-entropy subdomains, unusual record types, and query volumes to detect DNS tunneling and covert data exfiltration before it reaches other channels.
View Details
Email Authentication Hardening
implementing-dmarc-dkim-spf-email-security
mukul975/Anthropic-Cybersecurity-Skills
497
Implement SPF, DKIM, and DMARC to stop domain spoofing, verify message integrity, and enforce handling policies; ideal for teams configuring DNS/email servers and monitoring compliance.
View Details
Email Authentication Audit
implementing-email-security-with-dmarc-dkim-spf
mukul975/Anthropic-Cybersecurity-Skills
164
Audits a domain’s email authentication by querying SPF, DKIM, and DMARC DNS records using dnspython, validating syntax/counts, flagging common spoofing risks, and producing remediation guidance.
View Details
Prev
1
2
3
4
5
6
7
Next
Language
简体中文
English