Login
Download
Skill UI
Browse and discover
7044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
R
, found
4506
results
Default
Newest
Most Downloaded
Paper Figure Generation
paper-figure
wanshuiyin/Auto-claude-code-research-in-sleep
296
Auto-generates publication-quality plots and comparison tables from experiment data, following a shared matplotlib style, respecting figure plans, and preserving manual assets for ML papers.
View Details
Paper Plan Outline
paper-plan
wanshuiyin/Auto-claude-code-research-in-sleep
334
Generates structured paper outlines from review conclusions, experiments, and narratives, guiding authors through claim extraction and venue-aware section planning.
View Details
Sectional LaTeX Writer
paper-write
wanshuiyin/Auto-claude-code-research-in-sleep
306
Generates LaTeX paper sections from a detailed outline, orchestrating venue-specific templates, reviewer model checks, bibliography lookup, and figure inputs so researchers can iteratively draft camera-ready-ready manuscripts without manual formatting.
View Details
Paper Writing Pipeline
paper-writing
wanshuiyin/Auto-claude-code-research-in-sleep
125
Orchestrates the full paper-writing workflow from plan to polished PDF, chaining planning, figure generation, LaTeX drafting, compilation, and auto-improvement for research narratives or reports.
View Details
Saviynt Access Recertification
performing-access-recertification-with-saviynt
mukul975/Anthropic-Cybersecurity-Skills
155
Configure and execute Saviynt Enterprise Identity Cloud access recertification campaigns to validate user entitlements, revoke excessive privileges, and satisfy SOX/SOC2/HIPAA compliance through scheduled, event-driven, or on-demand reviews enriched with risk scoring and analytics.
View Details
Access Review Certification
performing-access-review-and-certification
mukul975/Anthropic-Cybersecurity-Skills
476
Conduct structured access reviews and certifications—defining campaign scope, selecting reviewers, prioritizing risks, and tracking remediation—to prove compliance during audits and governance-focused assessments.
View Details
Active Directory Breach Investigation
performing-active-directory-compromise-investigation
mukul975/Anthropic-Cybersecurity-Skills
477
Investigate Active Directory compromises by analyzing authentication logs, replication metadata, Group Policy changes, and Kerberos anomalies to map persistence and lateral movement during incident response or audits.
View Details
Forest Trust Attack Audit
performing-active-directory-forest-trust-attack
mukul975/Anthropic-Cybersecurity-Skills
423
Enumerates Active Directory forest trust relationships with impacket to audit SID filtering, trust keys, SID history abuse, and Kerberos inter-realm ticket risks for red-team assessments and incident response investigations.
View Details
Active Directory Pen Test
performing-active-directory-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
255
Guide for conducting focused Active Directory penetration tests: enumerate domain objects, analyze attack paths with BloodHound, abuse Kerberos, exploit ADCS/DCSync, and demonstrate privilege escalation to Domain Admin.
View Details
Active Directory Security Audit
performing-active-directory-vulnerability-assessment
mukul975/Anthropic-Cybersecurity-Skills
317
Guides security teams through Active Directory vulnerability assessments with PingCastle health checks, BloodHound attack-path mapping, and Purple Knight scoring to spot misconfigurations, privilege escalation paths, and Kerberos lateral-movement weaknesses in enterprise domains.
View Details
AiTM Phishing Detection
performing-adversary-in-the-middle-phishing-detection
mukul975/Anthropic-Cybersecurity-Skills
254
A workflow for detecting and responding to Adversary-in-the-Middle phishing attacks that swipe credentials/MFA tokens via reverse-proxy kits, with guidance for hardening MFA, conditional access, and logging.
View Details
Agentless Vulnerability Scanning
performing-agentless-vulnerability-scanning
mukul975/Anthropic-Cybersecurity-Skills
414
Sets up agentless vulnerability scanning across on-premises, cloud, and container environments by leveraging SSH/WMI, cloud snapshot APIs, and API-based discovery to assess systems without endpoint agents.
View Details
Prev
1
2
3
...
308
309
310
311
312
313
314
...
374
375
376
Next
Language
简体中文
English