Login
Download
Skill UI
Browse and discover
5998+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Logs
, found
127
results
Default
Newest
Most Downloaded
Certificate Transparency Phishing Monitor
analyzing-certificate-transparency-for-phishing
mukul975/Anthropic-Cybersecurity-Skills
405
Monitor Certificate Transparency logs via crt.sh and Certstream to spot phishing lookalike certificates targeting your brand, raise alerts, and feed intel workflows for proactive blocking.
View Details
DNS Exfiltration Detection
analyzing-dns-logs-for-exfiltration
mukul975/Anthropic-Cybersecurity-Skills
420
Scans DNS query logs within SIEM platforms to flag data exfiltration by spotting suspicious tunneling subdomains, high-entropy DGA-style domains, and abnormal query volumes, helping SOC teams uncover DNS-based threats evading standard controls.
View Details
Docker Container Forensics
analyzing-docker-container-forensics
mukul975/Anthropic-Cybersecurity-Skills
298
Guide to investigate compromised Docker containers by collecting container state, exporting filesystem layers, auditing volumes, logs, and host artifacts, and comparing images to detect malicious activity during incident response.
View Details
Kubernetes Audit Analyzer
analyzing-kubernetes-audit-logs
mukul975/Anthropic-Cybersecurity-Skills
106
Parses Kubernetes API server audit logs (JSON lines) to surface exec sessions, secret accesses, RBAC changes, privileged pods, and anonymous requests so incident responders or SIEM rule authors can spot cluster compromises.
View Details
Linux Audit Intrusion Detection
analyzing-linux-audit-logs-for-intrusion
mukul975/Anthropic-Cybersecurity-Skills
131
Parse Linux auditd logs for unauthorized file access, privilege escalation, syscall anomalies, and suspicious processes using ausearch plus Python automation.
View Details
URLScan Phishing Analysis
analyzing-malicious-url-with-urlscan
mukul975/Anthropic-Cybersecurity-Skills
306
Guides analysts through URLScan.io’s interface and API to safely render suspicious links, capture screenshots, inspect DOM/network logs, and automate IOC extraction for phishing investigations.
View Details
Network Incident Traffic Analysis
analyzing-network-traffic-for-incidents
mukul975/Anthropic-Cybersecurity-Skills
105
Analyzes PCAP captures, Zeek logs, and NetFlow flow data to uncover command-and-control, lateral movement, and exfiltration during security incidents; supports packet-level validation and IOC extraction for triage and response teams.
View Details
Office365 Audit Compromise
analyzing-office365-audit-logs-for-compromise
mukul975/Anthropic-Cybersecurity-Skills
277
Use Microsoft Graph to parse Office 365 Unified Audit Logs, enumerate inbox rules, spotting forwarding, delegation, OAuth grants, and other indicators of business email compromise for detection and investigation workflows.
View Details
PowerShell Script Block Analysis
analyzing-powershell-script-block-logging
mukul975/Anthropic-Cybersecurity-Skills
347
Parses PowerShell Event ID 4104 logs from EVTX files to rebuild script blocks, run entropy and pattern checks, and flag obfuscated commands, encoded payloads, download cradles, and AMSI bypass attempts for security response workflows.
View Details
TLS Transparency Log Monitoring
analyzing-tls-certificate-transparency-logs
mukul975/Anthropic-Cybersecurity-Skills
146
Queries Certificate Transparency logs via crt.sh and pycrtsh to catch phishing domains, unauthorized certificates, and typosquatting variations, flagging unexpected issuers and wildcard certificates for proactive brand-impersonation defense.
View Details
USB Connection History Analysis
analyzing-usb-device-connection-history
mukul975/Anthropic-Cybersecurity-Skills
336
Analyzes USB device connection history from Windows registry, event logs, and setupapi logs to trace removable media usage, correlate drive assignments, and support forensic or insider-threat investigations.
View Details
Web Log Intrusion Detection
analyzing-web-server-logs-for-intrusion
mukul975/Anthropic-Cybersecurity-Skills
497
Parses Apache/Nginx Combined logs to flag SQL injection, LFI, XSS, scanner fingerprints, brute-force bursts, enriches hits with GeoIP, and delivers a prioritized JSON report for SOC analysts.
View Details
Prev
1
2
3
4
5
6
7
8
9
10
11
Next
Language
简体中文
English