Login
Download
Skill UI
Browse and discover
6582+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Exploit
, found
82
results
Default
Newest
Most Downloaded
Defender Advanced Protection Setup
configuring-windows-defender-advanced-settings
mukul975/Anthropic-Cybersecurity-Skills
239
Configures Microsoft Defender for Endpoint advanced protections (ASR, controlled folder access, network and exploit settings) through PowerShell or Intune/SCCM policies to harden Windows endpoints and meet compliance expectations.
View Details
Privilege Escalation Detection
detecting-privilege-escalation-attempts
mukul975/Anthropic-Cybersecurity-Skills
450
Detect privilege escalation attempts across Windows and Linux by hunting for token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse using EDR/SIEM telemetry and intelligence-driven workflows.
View Details
AD CS ESC1 Exploit
exploiting-active-directory-certificate-services-esc1
mukul975/Anthropic-Cybersecurity-Skills
355
Exploit misconfigured Active Directory Certificate Services ESC1 templates to request certificates as privileged users, then escalate to Domain Admin during authorized red team or pentest work. Includes enumeration, certificate requests, PKINIT authentication, and follow-on domain access.
View Details
BloodHound AD Exploitation
exploiting-active-directory-with-bloodhound
mukul975/Anthropic-Cybersecurity-Skills
172
Use BloodHound and SharpHound to map Active Directory objects, visualize attack paths, and prioritize privilege escalation chains for authorized red team, penetration testing, or malware analysis work.
View Details
API Injection Exploitation
exploiting-api-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
459
Automates API injection security tests across endpoints by mapping inputs and crafting payloads for SQL, NoSQL, SSRF, and command injection vectors, helping analysts validate input handling and backend access control before production rollouts.
View Details
BGP Hijack Simulation
exploiting-bgp-hijacking-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
366
Guides building an isolated BGP lab to analyze hijacking scenarios, verify RPKI/ROV safeguards, reproduce more-specific and origin hijacks, and assess monitoring/alerting coverage before deploying defenses.
View Details
Broken Function Authorization Testing
exploiting-broken-function-level-authorization
mukul975/Anthropic-Cybersecurity-Skills
135
Automates testing APIs for Broken Function Level Authorization by mapping admin endpoints, manipulating HTTP methods, and validating access controls to expose privilege escalation risks.
View Details
Broken Link Hijacking
exploiting-broken-link-hijacking
mukul975/Anthropic-Cybersecurity-Skills
128
Audit web apps for dead external resources, verify claimable domains/cloud assets, and validate broken-link hijacking paths to demonstrate supply-chain and subdomain takeover risks.
View Details
Constrained Delegation Exploitation
exploiting-constrained-delegation-abuse
mukul975/Anthropic-Cybersecurity-Skills
438
Exploit Kerberos constrained delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self/S4U2proxy, enabling lateral movement, privilege escalation, and access to CIFS/HTTP/LDAP services during red-team assessments.
View Details
Mobile Deep Link Exploitation
exploiting-deeplink-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
84
Guides security testers through discovering and abusing Android and iOS deep link handling flaws—custom URI schemes, App/Universal Links, intent hijacking, and WebView payloads—to evaluate unauthorized access and injection risks in mobile apps.
View Details
API Excessive Data Exposure
exploiting-excessive-data-exposure-in-api
mukul975/Anthropic-Cybersecurity-Skills
241
Validates APIs that return more fields than their clients need by intercepting responses, comparing them to documentation, and scanning for leaked PII or internal identifiers based on OWASP API3 principles.
View Details
HTTP Request Smuggling
exploiting-http-request-smuggling
mukul975/Anthropic-Cybersecurity-Skills
237
Guides authorized security testers through detecting and exploiting HTTP request smuggling when front- and back-end servers disagree on Content-Length vs Transfer-Encoding, covering architecture checks, automation tools, and impact scenarios.
View Details
Prev
1
2
3
4
5
6
7
Next
Language
简体中文
English