Login
Download
Skill UI
Browse and discover
9183+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
ROV
, found
1847
results
Default
Newest
Most Downloaded
Post-Incident Lessons Review
conducting-post-incident-lessons-learned
mukul975/Anthropic-Cybersecurity-Skills
494
Structured facilitation of post-incident reviews that captures timelines, successes, failures, root causes, response metrics, and actionable improvements to strengthen future incident response.
View Details
AWS Verified Access ZTNA
configuring-aws-verified-access-for-ztna
mukul975/Anthropic-Cybersecurity-Skills
257
Guide to deploying AWS Verified Access for VPN-less Zero Trust Network Access, covering identity and device trust providers, Cedar policies, resource sharing, and endpoint configuration for secure internal application access.
View Details
Suricata Network Monitoring
configuring-suricata-for-network-monitoring
mukul975/Anthropic-Cybersecurity-Skills
412
Guides installing and tuning Suricata IDS/IPS for high-throughput links, with AF_PACKET capture, EVE JSON logging, Emerging Threats rules, and SIEM integration to provide real-time threat visibility and response.
View Details
Cloudflare Access Zero Trust
deploying-cloudflare-access-for-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
231
Step-by-step instructions for using Cloudflare Tunnel and Access policies to expose self-hosted services, configure identity providers, posture checks, and WARP enrollment so teams can replace VPNs with secure zero-trust access.
View Details
Quishing Detection Workflow
detecting-qr-code-phishing-with-email-security
mukul975/Anthropic-Cybersecurity-Skills
441
Provides a workflow for detecting QR-code-based phishing that embeds malicious URLs in email images by enabling image OCR, extracting and scanning QR URLs, sandboxing destinations, and extending protection to mobile users plus awareness training.
View Details
BGP Hijack Simulation
exploiting-bgp-hijacking-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
218
Guides building an isolated BGP lab to analyze hijacking scenarios, verify RPKI/ROV safeguards, reproduce more-specific and origin hijacks, and assess monitoring/alerting coverage before deploying defenses.
View Details
Insecure Deserialization Exploits
exploiting-insecure-deserialization
mukul975/Anthropic-Cybersecurity-Skills
173
Guide to spotting serialized payloads (cookies, APIs, ViewState) and weaponizing Java, PHP, Python, and .NET gadget chains to prove remote code execution during authorized penetration tests.
View Details
OAuth Misconfiguration Exploits
exploiting-oauth-misconfiguration
mukul975/Anthropic-Cybersecurity-Skills
101
Identifies and exploits OAuth 2.0/OpenID Connect misconfigurations during authorized security assessments, covering redirect URI manipulation, token leakage, authorization code theft, and scope escalation to evaluate provider and consumer defenses.
View Details
Docker Daemon Hardening
hardening-docker-daemon-configuration
mukul975/Anthropic-Cybersecurity-Skills
94
Provides guidelines for hardening the Docker daemon via daemon.json tweaks, user namespace remapping, TLS auth, rootless mode, and CIS benchmark settings to secure container hosts during deployment or assessments.
View Details
DNS Persistence Hunting Guide
hunting-for-dns-based-persistence
mukul975/Anthropic-Cybersecurity-Skills
262
Step-by-step skill to hunt DNS-based persistence by auditing zone baselines, querying SecurityTrails passive DNS, analyzing provider audit logs, and correlating anomalies to malicious infrastructure for actionable reports.
View Details
Azure AD PIM Implementation
implementing-azure-ad-privileged-identity-management
mukul975/Anthropic-Cybersecurity-Skills
336
Configure Microsoft Entra Privileged Identity Management to enforce just-in-time role activation, approvals, MFA, and access reviews for Azure AD privileged roles, using portal and Graph API workflows to implement Zero Trust identity governance.
View Details
RPKI BGP Security Setup
implementing-bgp-security-with-rpki
mukul975/Anthropic-Cybersecurity-Skills
345
Guides network engineers through creating ROAs via RIR portals, deploying an RPKI validator like Routinator, and configuring Cisco IOS-XE and Juniper Junos routers to enforce ROV policies that block hijacks and prefer validated paths.
View Details
Prev
1
2
3
...
76
77
78
79
80
81
82
...
152
153
154
Next
Language
简体中文
English