Login
Download
Skill UI
Browse and discover
6556+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Exploit
, found
73
results
Default
Newest
Most Downloaded
Server-Side Request Forgery Exploits
exploiting-server-side-request-forgery
mukul975/Anthropic-Cybersecurity-Skills
308
Guide to identifying and exploiting SSRF flaws during authorized penetration tests, covering payload crafting, metadata access, and internal scanning workflows.
View Details
SMB Exploitation With Metasploit
exploiting-smb-vulnerabilities-with-metasploit
mukul975/Anthropic-Cybersecurity-Skills
481
Guides authorized penetration testers through SMB enumeration, vulnerability scanning, and exploitation with Metasploit, CrackMapExec, and Impacket to prove risks on unpatched Windows estates.
View Details
SQL Injection Exploitation
exploiting-sql-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
248
Assesses web apps for SQL injection during authorized penetration tests, mapping inputs, fingerprinting databases, and exploiting manually or with sqlmap to demonstrate data theft, auth bypass, or remote code execution while validating defensive controls.
View Details
SQLmap SQL Injection Exploit
exploiting-sql-injection-with-sqlmap
mukul975/Anthropic-Cybersecurity-Skills
481
Guide for authorized penetration testers to use sqlmap for detecting, validating, and exploiting SQL injection vulnerabilities, enumerating databases, and demonstrating impact during engagements or CTFs.
View Details
Template Injection Exploitation
exploiting-template-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
200
Guides security teams through detecting and abusing server-side template injection flaws in engines like Jinja2, Twig, and Freemarker during authorized assessments, enabling remote code execution and sensitive data exposure.
View Details
PHP Type Juggling Exploit
exploiting-type-juggling-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
282
Exploit PHP loose comparison type juggling during pentests to bypass authentication, tamper hash checks, and trick access control logic while testing login forms, APIs, or serialized inputs with Burp Suite and payload lists.
View Details
Metasploit Vulnerability Validation
exploiting-vulnerabilities-with-metasploit-framework
mukul975/Anthropic-Cybersecurity-Skills
74
Uses the Metasploit Framework to validate vulnerabilities, demonstrate their impact, and prioritize remediation by reproducing exploit paths in authorized environments, covering scanning, exploitation, and post-exploitation evidence gathering.
View Details
Exploiting WebSocket Flaws
exploiting-websocket-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
361
Guides authenticated security assessments of WebSocket implementations by enumerating endpoints, verifying authentication, checking cross-site hijacking protections, and testing for message injection issues across real-time features.
View Details
Zerologon Domain Controller Exploit
exploiting-zerologon-vulnerability-cve-2020-1472
mukul975/Anthropic-Cybersecurity-Skills
108
Step-by-step guidance to exploit CVE-2020-1472 via Netlogon, reset a domain controller machine account password to empty, and leverage that foothold for DCSync or persistence during authorized red-team campaigns with restoration guidance.
View Details
EPSS Vulnerability Prioritization
implementing-epss-score-for-vulnerability-prioritization
mukul975/Anthropic-Cybersecurity-Skills
171
Integrates FIRST's EPSS API with vulnerability scan data to rank CVEs by real-world exploitation likelihood, combines CVSS thresholds for actionable priorities, and supports automation of remediation workflows.
View Details
Memory Protection Hardening
implementing-memory-protection-with-dep-aslr
mukul975/Anthropic-Cybersecurity-Skills
414
Guides deploying DEP, ASLR, CFG, and other Windows exploit mitigations to harden endpoints, covering system-wide and per-app configuration plus deployment through Intune or GPO.
View Details
Active Directory Red Teaming
performing-active-directory-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
410
Step-by-step guidance for conducting a focused Active Directory penetration test, from enumeration and BloodHound attack-path analysis to Kerberos abuse, ADCS/DCSync exploitation, and proving domain compromise during security assessments or incident response.
View Details
Prev
1
2
3
4
5
6
7
Next
Language
简体中文
English