Login
Download
Skill UI
Browse and discover
6556+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
MITRE ATT&CK
, found
21
results
Default
Newest
Most Downloaded
SIEM Detection Use Cases
implementing-siem-use-cases-for-detection
mukul975/Anthropic-Cybersecurity-Skills
279
Guides SOC teams through building SIEM detection use cases by mapping MITRE ATT&CK techniques, designing correlation rules, and implementing alerts across Splunk, Elastic Security, and Sentinel to formalize lifecycle management and expand coverage for compliance and threat scenarios.
View Details
MISP Threat Intelligence
implementing-threat-intelligence-platform
mukul975/Anthropic-Cybersecurity-Skills
65
Build a PyMISP-driven threat intelligence platform that ingests multiple IOC feeds, tags MITRE ATT&CK techniques, enriches data via VirusTotal and AbuseIPDB, and exports STIX 2.1 bundles for SIEM pipelines.
View Details
Threat Modeling MITRE ATT&CK
implementing-threat-modeling-with-mitre-attack
mukul975/Anthropic-Cybersecurity-Skills
403
Implements threat modeling using MITRE ATT&CK to align SOC detection engineering with adversary TTPs, highlight coverage gaps, prioritize defensive investments, and support purple team exercises or new environment assessments.
View Details
Mapping MITRE ATT&CK Techniques
mapping-mitre-attack-techniques
mukul975/Anthropic-Cybersecurity-Skills
269
Maps observed adversary behaviors, alerts, and detection rules to MITRE ATT&CK techniques so you can quantify coverage, prioritize controls, tag Sigma/SIEM cases, and build Navigator heatmaps for reporting.
View Details
Purple Team Exercise
performing-purple-team-exercise
mukul975/Anthropic-Cybersecurity-Skills
127
Coordinates purple-team exercises that align red team attack emulation with blue team detection validation using MITRE ATT&CK scenarios and real-time SOC collaboration.
View Details
Sharing Threat Intelligence With MISP
performing-threat-intelligence-sharing-with-misp
mukul975/Anthropic-Cybersecurity-Skills
485
Guide for using PyMISP to create, enrich, and publish threat intelligence events on MISP, manage IOC feeds, apply MITRE ATT&CK/TLP metadata, and export STIX 2.1 for interoperable sharing.
View Details
Purple Team Atomic Testing
performing-purple-team-atomic-testing
mukul975/Anthropic-Cybersecurity-Skills
191
Automates Atomic Red Team executions to validate MITRE ATT&CK coverage, generate Navigator heatmaps, correlate Sigma rules, and measure detection-engineering loops so purple teams can tune SIEM/EDR visibility through repeatable adversary emulation.
View Details
Red Team Planner
red-team
alirezarezvani/claude-skills
432
Organizes MITRE ATT&CK-informed red team engagements by scoring techniques on effort and detection risk, sequencing kill-chain phases, identifying choke points, and flagging OPSEC concerns before executing simulations with authorization.
View Details
Proactive Threat Detection
threat-detection
alirezarezvani/claude-skills
266
Provides methodology and tooling for proactive threat hunting, IOC analysis, and statistical anomaly detection across telemetry before alerts fire, including MITRE ATT&CK signal prioritization and deception readiness.
View Details
Prev
1
2
Language
简体中文
English