Login
Download
Skill UI
Browse and discover
6170+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Strike
, found
6
results
Default
Newest
Most Downloaded
Sentry Incident Runbook
sentry-incident-runbook
jeremylongshore/claude-code-plugins-plus-skills
287
Guides teams through Sentry-based incident response—from monitoring dashboards and classifying severity to retrieving issue details, applying resolution steps, and producing postmortems when production errors strike.
View Details
Cobalt Strike Beacon Config
analyzing-cobalt-strike-beacon-configuration
mukul975/Anthropic-Cybersecurity-Skills
420
Extract and inspect Cobalt Strike beacon configuration from PE files or memory dumps to reveal C2 servers, malleable profiles, watermarks, and other operator tradecraft for incident response or hunting.
View Details
Cobalt Strike Profile Analysis
analyzing-cobalt-strike-malleable-profiles
mukul975/Anthropic-Cybersecurity-Skills
476
Parses Cobalt Strike malleable C2 profiles via pyMalleableC2 to pull beacon configs, HTTP communication patterns, sleep/jitter settings, and combines JARM scans for C2 detection when hunting suspected infrastructure or building IDS signatures.
View Details
Cobalt Strike Profile Analysis
analyzing-cobaltstrike-malleable-c2-profiles
mukul975/Anthropic-Cybersecurity-Skills
346
Parse and analyze Cobalt Strike Malleable C2 profiles to extract HTTP transformations, indicator data, and process behaviors, enabling SOC analysts and threat hunters to generate structured detection rules and validate monitoring coverage.
View Details
Ransomware Network Precursors Detection
detecting-ransomware-precursors-in-network
mukul975/Anthropic-Cybersecurity-Skills
279
Identifies early-stage ransomware indicators in Zeek/Suricata/Arkime traffic, correlates with SIEM rules and threat feeds, and alerts on Cobalt Strike beacons, Mimikatz signatures, RDP brute-force and staging behaviors before encryption begins.
View Details
Zero Trust Posture Assessment
implementing-device-posture-assessment-in-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
283
Implements zero trust device posture assessment by aggregating CrowdStrike ZTA, Intune, and Jamf signals into conditional access policies so Entra ID only grants resources to compliant endpoints while blocking compromised ones.
View Details
1
Language
简体中文
English