Login
Download
Skill UI
Browse and discover
6201+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Monitor
, found
347
results
Default
Newest
Most Downloaded
Startup Folder Persistence Detection
hunting-for-startup-folder-persistence
mukul975/Anthropic-Cybersecurity-Skills
71
Detect Windows startup folder persistence by scanning user and system autostart directories, flagging suspicious file types, monitoring real-time changes via Python watchdog, and generating T1547.001-aligned threat hunting reports for incident responders.
View Details
LOLBAS Detection Rules
hunting-living-off-the-land-binaries
mukul975/Anthropic-Cybersecurity-Skills
103
Monitors Windows process creation events to flag Living Off The Land Binary abuse by matching Event ID 4688/Sysmon 1 logs against LOLBAS database entries, supporting threat hunting and SIEM rule creation for fileless attacks.
View Details
Secure API Key Controls
implementing-api-key-security-controls
mukul975/Anthropic-Cybersecurity-Skills
439
Implements secure API key lifecycle controls—generation, hashing, storage, validation, rotation, scope/rate limits, and monitoring—to protect server-to-server credentials from leakage or abuse.
View Details
Apigee API Threat Protection
implementing-api-threat-protection-with-apigee
mukul975/Anthropic-Cybersecurity-Skills
197
Implement Google Apigee policies such as JSON/XML validation, regex monitoring, SpikeArrest rate limiting, OAuth2 token checks, and API key verification to shield APIs from OWASP API Security Top 10 threats before requests reach backend services.
View Details
CloudTrail Log Analysis
implementing-cloud-trail-log-analysis
mukul975/Anthropic-Cybersecurity-Skills
109
Implements AWS CloudTrail log analysis with Athena, CloudWatch Logs Insights, and SIEM feeds to monitor API activity, detect privilege escalation, unauthorized access, and support forensic investigations across AWS environments.
View Details
Cloud Workload Protection
implementing-cloud-workload-protection
mukul975/Anthropic-Cybersecurity-Skills
259
Implements cloud workload protection using boto3 and google-cloud APIs for runtime monitoring, anomaly detection, file integrity checks, and resource audits to hunt cryptominers, reverse shells, and unauthorized binaries on EC2 and GCE workloads.
View Details
Canarytoken Deception Detection
implementing-deception-based-detection-with-canarytoken
mukul975/Anthropic-Cybersecurity-Skills
102
Automates Canary Tokens via the Thinkst Canary API to deploy web bugs, DNS, document, and AWS key tokens, monitor alerts, and report deception coverage for breach detection and response.
View Details
BitLocker Disk Encryption
implementing-disk-encryption-with-bitlocker
mukul975/Anthropic-Cybersecurity-Skills
461
Automates full-disk protection on Windows endpoints via BitLocker, covering prerequisite checks, GPO/Intune policies, TPM/PIN setup, recovery key escrow, and fleet monitoring for compliance-driven deployments and mobile workstation hardening.
View Details
DMARC DKIM SPF Setup
implementing-dmarc-dkim-spf-email-security
mukul975/Anthropic-Cybersecurity-Skills
138
Step-by-step guide to implement SPF, DKIM, and DMARC so administrators can authenticate outbound mail, block spoofing, and monitor compliance through DNS records and reporting scripts.
View Details
Dragos OT Monitoring Deployment
implementing-dragos-platform-for-ot-monitoring
mukul975/Anthropic-Cybersecurity-Skills
297
Deploy and configure the Dragos Platform to monitor OT networks with industrial protocol parsing, intelligence-driven threat detection, asset visibility, and SIEM integration for ICS-focused SOCs.
View Details
Proofpoint Email Sandboxing
implementing-email-sandboxing-with-proofpoint
mukul975/Anthropic-Cybersecurity-Skills
442
Configures Proofpoint TAP to detonate suspicious attachments/URLs, tune sandbox policies, monitor dashboards, and feed SIEM for phishing and zero-day malware defense—ideal when deploying secure email flows or proving compliance.
View Details
GCP VPC Firewall Control
implementing-gcp-vpc-firewall-rules
mukul975/Anthropic-Cybersecurity-Skills
290
Guide for auditing and enforcing GCP VPC firewall rules, covering restrictive ingress/egress policies, hierarchical organization policies, and VPC Flow Log monitoring to keep workloads segmented and compliant.
View Details
Prev
1
2
3
...
23
24
25
26
27
28
29
Next
Language
简体中文
English