Login
Download
Skill UI
Browse and discover
6006+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Patterns
, found
450
results
Default
Newest
Most Downloaded
Mimikatz Execution Detection
detecting-mimikatz-execution-patterns
mukul975/Anthropic-Cybersecurity-Skills
91
Detect execution patterns of Mimikatz by correlating command-line signatures, LSASS access anomalies, binary indicators, and in-memory modules across EDR and SIEM telemetry, supporting proactive threat hunting and incident response.
View Details
OAuth Token Theft Detection
detecting-oauth-token-theft
mukul975/Anthropic-Cybersecurity-Skills
124
Analyzes OAuth sign-in telemetry via Microsoft Graph and Okta APIs to spot impossible travel, new device patterns, token replay from unusual IPs, and anomalous scope requests, enabling early detection of access token theft.
View Details
RDP Brute Force Detection
detecting-rdp-brute-force-attacks
mukul975/Anthropic-Cybersecurity-Skills
147
Detect RDP brute-force attacks by parsing Windows Security EVTX logs, correlating Event ID 4625 failures with subsequent 4624 successes, spotting NLA bypass patterns, and summarizing source-IP trends for actionable alerts.
View Details
Detecting S3 Exfiltration
detecting-s3-data-exfiltration-attempts
mukul975/Anthropic-Cybersecurity-Skills
481
Detect S3 data exfiltration by correlating CloudTrail data events, GuardDuty findings, Macie alerts, and access patterns to flag bulk downloads or cross-account transfers.
View Details
Credential Stuffing Detection
hunting-credential-stuffing-attacks
mukul975/Anthropic-Cybersecurity-Skills
329
Detects credential stuffing by analyzing authentication logs for login velocity anomalies, ASN diversity, password spray patterns, and geographic distribution of failed logins, helping incident responders investigate account takeover campaigns or craft new detection rules.
View Details
Detect C2 Beaconing Patterns
hunting-for-command-and-control-beaconing
mukul975/Anthropic-Cybersecurity-Skills
469
Detect C2 beaconing patterns by analyzing network telemetry for regular intervals, jitter, and domain reputation to find compromised endpoints communicating with adversary infrastructure before outbreaks escalate.
View Details
Timestomping Defense Hunting
hunting-for-defense-evasion-via-timestomping
mukul975/Anthropic-Cybersecurity-Skills
69
Detect MITRE T1070.006 timestamp manipulation by comparing NTFS $STANDARD_INFORMATION and $FILE_NAME entries in the MFT, leveraging analyzeMFT and Python to flag anomalous temporal patterns indicative of anti-forensic timestomping activity during threat hunts.
View Details
Scheduled Task Persistence Hunt
hunting-for-scheduled-task-persistence
mukul975/Anthropic-Cybersecurity-Skills
145
Hunt for adversary persistence via Windows Scheduled Tasks by analyzing creation events, suspicious task actions, and unusual scheduling patterns across EDR and SIEM telemetry to validate detections and inform incident response.
View Details
Runtime Application Self-Protection
implementing-runtime-application-self-protection
mukul975/Anthropic-Cybersecurity-Skills
114
Deploy OpenRASP agents to instrument Java and Python apps at runtime, detect OWASP Top 10 patterns, tune policies, and forward alerts to SIEM for comprehensive threat response.
View Details
Laravel Architecture Playbook
laravel-patterns
affaan-m/everything-claude-code
376
Provides production-grade Laravel architecture patterns for controllers, services, Eloquent models, APIs, queues, events, caching, and background jobs in scalable apps.
View Details
MCP Server Patterns
mcp-server-patterns
affaan-m/everything-claude-code
351
Guides building MCP servers with the Node/TypeScript SDK, covering tool/resource/prompt registration, stdio vs Streamable HTTP transports, validation with Zod, and keeping logic compatible with evolving Context7 or official docs.
View Details
Paste Site Leak Monitor
performing-paste-site-monitoring-for-credentials
mukul975/Anthropic-Cybersecurity-Skills
328
Automates monitoring of Pastebin, GitHub Gists, and similar paste sites for leaked credentials, API keys, and sensitive data using keyword matching, regex patterns, and API scraping so SOCs can detect breaches before adversaries weaponize stolen secrets.
View Details
Prev
1
2
3
...
34
35
36
37
38
Next
Language
简体中文
English