Login
Download
Skill UI
Browse and discover
6034+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Threat Actors
, found
4
results
Default
Newest
Most Downloaded
MITRE ATT&CK TTP Mapping
analyzing-threat-actor-ttps-with-mitre-attack
mukul975/Anthropic-Cybersecurity-Skills
257
Map threat actors to the MITRE ATT&CK framework, build ATT&CK Navigator technique coverage layers, identify detection gaps, and link observed IOCs to adversary tactics across Enterprise, Mobile, and ICS matrices for actionable reporting.
View Details
Analyzing Threat Landscape
analyzing-threat-landscape-with-misp
mukul975/Anthropic-Cybersecurity-Skills
140
Use PyMISP to query MISP events, compute IOC type breakdowns, highlight top threat actors, MITRE techniques, and galaxy clusters, and produce temporal trend reports to help security teams understand the evolving threat landscape.
View Details
Automated IOC Enrichment
building-ioc-enrichment-pipeline-with-opencti
mukul975/Anthropic-Cybersecurity-Skills
179
Builds an automated pipeline on OpenCTI to enrich newly ingested IOCs with context from VirusTotal, Shodan, AbuseIPDB, GreyNoise, and other sources, correlating them with threat actors/campaigns and scoring for prioritization.
View Details
IDS Network Scan Detection
detecting-network-scanning-with-ids-signatures
mukul975/Anthropic-Cybersecurity-Skills
264
Detect reconnaissance tools such as Nmap and Masscan using Suricata/Snort IDS signatures, thresholds, and anomaly cues to alert on TCP/UDP scans, SYN/ACK probes, and other scan fingerprints before threat actors escalate.
View Details
1
Language
简体中文
English