Login
Download
Skill UI
Browse and discover
7044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Paths
, found
52
results
Default
Newest
Most Downloaded
SOC Escalation Matrix
building-soc-escalation-matrix
mukul975/Anthropic-Cybersecurity-Skills
412
Defines a structured SOC escalation matrix covering severity tiers, SLAs, escalation paths, and notification procedures so security teams can align response flows during incidents.
View Details
Forced Browsing Auth Bypass
bypassing-authentication-with-forced-browsing
mukul975/Anthropic-Cybersecurity-Skills
107
Guide that enumerates hidden web paths and APIs with ffuf/Gobuster, compares authenticated vs unauthenticated outcomes, and validates endpoint enforcement during authorized security tests.
View Details
Internal Network Pen Test
conducting-internal-network-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
93
Conduct a simulated insider or post-breach internal network penetration test covering discovery, enumeration, credential harvesting, and lateral movement to assess privilege escalation paths and data exposure.
View Details
BloodHound CE Recon
conducting-internal-reconnaissance-with-bloodhound-ce
mukul975/Anthropic-Cybersecurity-Skills
199
Use BloodHound CE to map Active Directory attack paths, import SharpHound collections, run custom Cypher queries, and prioritize escalation chains for red team reconnaissance and security validation.
View Details
AWS IAM Escalation Detection
detecting-aws-iam-privilege-escalation
mukul975/Anthropic-Cybersecurity-Skills
294
Uses boto3 plus Cloudsplaining-style policy analysis to detect AWS IAM privilege escalation paths, highlight dangerous permission combinations, and deliver structured remediation guidance for SOC and security teams.
View Details
Privilege Escalation Detection
detecting-privilege-escalation-attempts
mukul975/Anthropic-Cybersecurity-Skills
450
Detect privilege escalation attempts across Windows and Linux by hunting for token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse using EDR/SIEM telemetry and intelligence-driven workflows.
View Details
BloodHound AD Exploitation
exploiting-active-directory-with-bloodhound
mukul975/Anthropic-Cybersecurity-Skills
172
Use BloodHound and SharpHound to map Active Directory objects, visualize attack paths, and prioritize privilege escalation chains for authorized red team, penetration testing, or malware analysis work.
View Details
Broken Link Hijacking
exploiting-broken-link-hijacking
mukul975/Anthropic-Cybersecurity-Skills
128
Audit web apps for dead external resources, verify claimable domains/cloud assets, and validate broken-link hijacking paths to demonstrate supply-chain and subdomain takeover risks.
View Details
Hunt LOLBins Execution
hunting-for-lolbins-execution-in-endpoint-logs
mukul975/Anthropic-Cybersecurity-Skills
83
Analyzes endpoint process logs to detect legitimate Windows binaries abused by adversaries, ranking suspicious command lines, parent processes, execution paths, and network cues for prioritized triage.
View Details
Detect Unusual Windows Services
hunting-for-unusual-service-installations
mukul975/Anthropic-Cybersecurity-Skills
183
Hunt malicious Windows services by parsing System.evtx Event ID 7045 records, analyzing binary paths (temp folders, PowerShell/cmd patterns), flagging risky indicators, and mapping findings to MITRE ATT&CK T1543.003 for SOC reporting.
View Details
XM Cyber Attack Path Analysis
implementing-attack-path-analysis-with-xm-cyber
mukul975/Anthropic-Cybersecurity-Skills
362
Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize critical exposures for remediation across on-premises and cloud environments.
View Details
RPKI BGP Security Setup
implementing-bgp-security-with-rpki
mukul975/Anthropic-Cybersecurity-Skills
64
Guides network engineers through creating ROAs via RIR portals, deploying an RPKI validator like Routinator, and configuring Cisco IOS-XE and Juniper Junos routers to enforce ROV policies that block hijacks and prefer validated paths.
View Details
Prev
1
2
3
4
5
Next
Language
简体中文
English