Login
Download
Skill UI
Browse and discover
6283+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
SET
, found
537
results
Default
Newest
Most Downloaded
Architecture Decision Recorder
create-adr
tech-leads-club/agent-skills
365
Generates Architecture Decision Records to capture the context, committed choice, and consequences so teams can reference why a technical direction was adopted once the decision is settled.
View Details
Autoresearch Experiment Setup
setup
alirezarezvani/claude-skills
312
Interactive command that gathers domain, target file, evaluation command, metric, direction, evaluator, and scope to initiate a new autoresearch experiment and list existing experiments or evaluators.
View Details
Cobalt Strike Profile Analysis
analyzing-cobalt-strike-malleable-profiles
mukul975/Anthropic-Cybersecurity-Skills
476
Parses Cobalt Strike malleable C2 profiles via pyMalleableC2 to pull beacon configs, HTTP communication patterns, sleep/jitter settings, and combines JARM scans for C2 detection when hunting suspected infrastructure or building IDS signatures.
View Details
Prefetch Execution Analysis Guide
analyzing-prefetch-files-for-execution-history
mukul975/Anthropic-Cybersecurity-Skills
225
Guide for parsing Windows Prefetch files to reconstruct program execution history, run counts, timestamps, and referenced assets for forensic investigations and incident timelines.
View Details
USB Device History Analysis
analyzing-usb-device-connection-history
mukul975/Anthropic-Cybersecurity-Skills
439
Collects Windows registry hives, SetupAPI logs, and relevant event logs to extract USB storage records, drive-letter assignments, and user mount history for forensic timelines and potential data exfiltration investigations.
View Details
Azure AD Audit Workflow
auditing-azure-active-directory-configuration
mukul975/Anthropic-Cybersecurity-Skills
115
Guides security teams through auditing Microsoft Entra ID settings to spot risky authentication policies, over-permissive roles, stale accounts, and guest user exposures using PowerShell, Microsoft Graph, and ScoutSuite.
View Details
SAML Azure AD Federation
building-identity-federation-with-saml-azure-ad
mukul975/Anthropic-Cybersecurity-Skills
269
Guides setting up SAML 2.0 federation between on-premises Active Directory (AD FS or third-party IdP) and Microsoft Entra ID, covering infrastructure prep, Azure domain federation settings, claims rules, and SSO for cloud apps.
View Details
Vulnerability Scanning Workflow
building-vulnerability-scanning-workflow
mukul975/Anthropic-Cybersecurity-Skills
469
Orchestrates recurring vulnerability scans with Nessus, Qualys, or OpenVAS, layers asset criticality and CISA KEV prioritization, integrates results into SIEM, and tracks remediation via SLA dashboards for SOC teams.
View Details
Social Engineering PenTest
conducting-social-engineering-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
262
Blueprint for designing and running phishing, vishing, smishing and physical pretext campaigns with GoPhish, SET and Evilginx to measure employee security awareness and expose training gaps for red-team/assessment contexts.
View Details
AWS Verified Access ZTNA
configuring-aws-verified-access-for-ztna
mukul975/Anthropic-Cybersecurity-Skills
445
Set up AWS Verified Access for VPN-less Zero Trust Network Access, tying Cedar policies to identity and device posture providers so internal apps are granted per-request access only when security requirements are met and shared securely via RAM.
View Details
OpenSSL Certificate Authority Setup
configuring-certificate-authority-with-openssl
mukul975/Anthropic-Cybersecurity-Skills
314
Walks through building a two-tier PKI with OpenSSL and Python, covering root/intermediate CAs, CRL/OCSP distribution, and certificate policy management.
View Details
Host Intrusion Detection Setup
configuring-host-based-intrusion-detection
mukul975/Anthropic-Cybersecurity-Skills
185
Guides configuring OSSEC/Wazuh/AIDE host-based intrusion detection with agent deployment, file integrity policies, rootkit checks, log rules, and active responses to monitor endpoints and support compliance efforts.
View Details
Prev
1
2
3
...
37
38
39
40
41
42
43
44
45
Next
Language
简体中文
English