Login
Download
Skill UI
Browse and discover
6011+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Entropy
, found
8
results
Default
Newest
Most Downloaded
Secret Scanner Integration
scanning-for-secrets
jeremylongshore/claude-code-plugins-plus-skills
485
Scans your codebase with pattern matching and entropy analysis to detect exposed secrets like API keys, passwords, and private keys, then generates remediation reports so you can fix vulnerabilities before committing or deploying code.
View Details
DNS Exfiltration Detection
analyzing-dns-logs-for-exfiltration
mukul975/Anthropic-Cybersecurity-Skills
420
Scans DNS query logs within SIEM platforms to flag data exfiltration by spotting suspicious tunneling subdomains, high-entropy DGA-style domains, and abnormal query volumes, helping SOC teams uncover DNS-based threats evading standard controls.
View Details
PowerShell Script Block Analysis
analyzing-powershell-script-block-logging
mukul975/Anthropic-Cybersecurity-Skills
347
Parses PowerShell Event ID 4104 logs from EVTX files to rebuild script blocks, run entropy and pattern checks, and flag obfuscated commands, encoded payloads, download cradles, and AMSI bypass attempts for security response workflows.
View Details
DNS Exfiltration Detection
detecting-dns-exfiltration-with-dns-query-analysis
mukul975/Anthropic-Cybersecurity-Skills
238
Detects DNS tunneling exfiltration by analyzing passive DNS logs for anomalous query entropy, volumes, subdomain length, TXT abuse, and response payloads with statistical and ML techniques to alert on covert data leakage.
View Details
Zeek DNS Exfiltration Detection
detecting-exfiltration-over-dns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
387
Analyzes Zeek dns.log data to spot DNS-based exfiltration by measuring entropy, label length, subdomain volume, and query rates, then scores and reports suspicious domains for incident response.
View Details
Zeek DNS Tunneling Hunt
hunting-for-dns-tunneling-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
95
Detect DNS tunneling data exfiltration by analyzing Zeek dns.log for high-entropy subdomains, long queries, unusual record types, and elevated volume, correlating with connection metadata and threat intelligence.
View Details
Webshell Hunting Agent
hunting-for-webshells-in-web-servers
mukul975/Anthropic-Cybersecurity-Skills
228
Scans web server roots for high-entropy files, suspicious PHP/JSP/ASP payloads, and recent modifications to flag obfuscated webshells via entropy thresholds, regex signatures, and file metadata.
View Details
DNS Tunneling Detection
performing-dns-tunneling-detection
mukul975/Anthropic-Cybersecurity-Skills
51
Leverages entropy metrics, query length checks, TXT volume monitoring, and subdomain cardinality analysis to spot covert DNS channels during threat hunting with Scapy-based traffic inspection.
View Details
1
Language
简体中文
English