Login
Download
Skill UI
Browse and discover
7093+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
SCA
, found
537
results
Default
Newest
Most Downloaded
IDS Scan Detection
detecting-network-scanning-with-ids-signatures
mukul975/Anthropic-Cybersecurity-Skills
184
Use Suricata or Snort IDS signatures, threshold rules, and traffic anomaly analysis to spot Nmap, Masscan, and custom port scans early in the kill chain and feed structured alerts for SOC handling.
View Details
Fail2ban Port Scan Guard
detecting-port-scanning-with-fail2ban
mukul975/Anthropic-Cybersecurity-Skills
198
Configures Fail2ban with custom filters, iptables logging, and webhook ban actions to detect port scanning, SSH brute-force, and HTTP probes, automatically blocking offenders and notifying teams for faster incident response.
View Details
Privilege Escalation Detection
detecting-privilege-escalation-attempts
mukul975/Anthropic-Cybersecurity-Skills
180
Detect privilege escalation attempts across Windows and Linux by hunting for token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse using EDR/SIEM telemetry and intelligence-driven workflows.
View Details
Kubernetes Privilege Escalation Detection
detecting-privilege-escalation-in-kubernetes-pods
mukul975/Anthropic-Cybersecurity-Skills
166
Monitors Kubernetes pods for privilege escalation by combining admission controls (Pod Security Admission, OPA Gatekeeper) with Falco runtime rules on capabilities, setuid binaries, and namespace usage so SOC analysts can block risky containers and hunt threats.
View Details
Quishing Detection Workflow
detecting-qr-code-phishing-with-email-security
mukul975/Anthropic-Cybersecurity-Skills
268
Provides a workflow for detecting QR-code-based phishing that embeds malicious URLs in email images by enabling image OCR, extracting and scanning QR URLs, sandboxing destinations, and extending protection to mobile users plus awareness training.
View Details
Service Account Abuse Detection
detecting-service-account-abuse
mukul975/Anthropic-Cybersecurity-Skills
225
Structured threat-hunting workflow that detects anomalous service-account logons, lateral movement, and privilege escalation by guiding analysts through hypothesis formation, SIEM/EDR querying, correlation and validation for proactive response.
View Details
CiCd Supply Chain Detection
detecting-supply-chain-attacks-in-ci-cd
mukul975/Anthropic-Cybersecurity-Skills
77
Scans GitHub Actions workflows and CI/CD pipeline files to flag unpinned actions, expressions that may inject scripts, dependency confusion, and exposed secrets while automating audits for analysts hardening build systems.
View Details
Detect Elevation Control Abuse
detecting-t1548-abuse-elevation-control-mechanism
mukul975/Anthropic-Cybersecurity-Skills
323
Surfaces abuse of elevation control mechanisms by correlating registry edits, auto-elevating binaries, integrity changes, and Linux sudo/setuid anomalies to hunt for privilege escalation across Windows and Linux environments.
View Details
AD CS ESC1 Exploit
exploiting-active-directory-certificate-services-esc1
mukul975/Anthropic-Cybersecurity-Skills
56
Exploit misconfigured Active Directory Certificate Services ESC1 templates to request certificates as privileged users, then escalate to Domain Admin during authorized red team or pentest work. Includes enumeration, certificate requests, PKINIT authentication, and follow-on domain access.
View Details
BloodHound AD Exploitation
exploiting-active-directory-with-bloodhound
mukul975/Anthropic-Cybersecurity-Skills
456
Use BloodHound and SharpHound to map Active Directory objects, visualize attack paths, and prioritize privilege escalation chains for authorized red team, penetration testing, or malware analysis work.
View Details
Broken Function Authorization Testing
exploiting-broken-function-level-authorization
mukul975/Anthropic-Cybersecurity-Skills
375
Automates testing APIs for Broken Function Level Authorization by mapping admin endpoints, manipulating HTTP methods, and validating access controls to expose privilege escalation risks.
View Details
Constrained Delegation Exploitation
exploiting-constrained-delegation-abuse
mukul975/Anthropic-Cybersecurity-Skills
328
Exploit Kerberos constrained delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self/S4U2proxy, enabling lateral movement, privilege escalation, and access to CIFS/HTTP/LDAP services during red-team assessments.
View Details
Prev
1
2
3
...
28
29
30
31
32
33
34
...
43
44
45
Next
Language
简体中文
English