Login
Download
Skill UI
Browse and discover
6556+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Signature
, found
56
results
Default
Newest
Most Downloaded
IDS Scan Detection Rules
detecting-network-scanning-with-ids-signatures
mukul975/Anthropic-Cybersecurity-Skills
113
Detect early network reconnaissance by deploying Suricata/Snort signatures, threshold rules, and anomaly checks for Nmap, Masscan, and custom scan patterns to alert SOC teams before attacks progress.
View Details
JWT Algorithm Confusion Exploit
exploiting-jwt-algorithm-confusion-attack
mukul975/Anthropic-Cybersecurity-Skills
382
Automates testing for JWT algorithm confusion vulnerabilities by downgrading RS256 to HS256, switching alg to none, and injecting attacker-controlled keys to detect signature bypasses in token-based APIs.
View Details
Webshell Hunting Agent
hunting-for-webshells-in-web-servers
mukul975/Anthropic-Cybersecurity-Skills
228
Scans web server roots for high-entropy files, suspicious PHP/JSP/ASP payloads, and recent modifications to flag obfuscated webshells via entropy thresholds, regex signatures, and file metadata.
View Details
Ed25519 Signature Toolkit
implementing-digital-signatures-with-ed25519
mukul975/Anthropic-Cybersecurity-Skills
417
A concise implementation guide covering Ed25519 key generation, signing, verification, and comparisons with RSA/ECDSA for document, code, and API authentication workflows in secure environments.
View Details
YARA Rule Detection
performing-yara-rule-development-for-detection
mukul975/Anthropic-Cybersecurity-Skills
432
Develop precise YARA/YARA-X signatures by extracting strings, imports, and byte patterns from PE samples to detect malware while minimizing false positives during assessments, IR, and security audits.
View Details
UEFI Bootkit Persistence Forensics
analyzing-uefi-bootkit-persistence
mukul975/Anthropic-Cybersecurity-Skills
110
Documented workflow for analyzing persistent UEFI bootkits, covering SPI firmware dumping, EFI System Partition inspection, Secure Boot variable auditing, known bootkit signature scanning, and Secure Boot bypass detection with chipsec and YARA.
View Details
Node.js Ethereum Hashing Fix
nodejs-keccak256
affaan-m/everything-claude-code
76
Ensures Node.js projects compute Ethereum Keccak-256 hashes instead of incorrect SHA3-256 by guiding developers to use ethers/viem/web3 helpers, preventing selector, signature, storage-slot, and address derivation bugs while easing audits.
View Details
Microsoft SDK Reference
microsoft-code-reference
MicrosoftDocs/mcp
51
Checks Microsoft SDK code by verifying API signatures, fetching docs, and finding Azure samples before writing or reviewing code that touches .NET or Microsoft APIs.
View Details
Prev
1
2
3
4
5
Language
简体中文
English