Login
Download
Skill UI
Browse and discover
6069+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
cti-reports
, found
40
results
Default
Newest
Most Downloaded
Playwright Testing Toolkit
playwright-pro
alirezarezvani/claude-skills
119
Playwright Pro delivers a production-grade toolkit for end-to-end browser automation: scaffold config and CI, generate/review/fix suites, migrate from Cypress/Selenium, sync with TestRail, and run BrowserStack reports with smart reporting and quality hooks.
View Details
Malware Sandbox Evasion Detection
analyzing-malware-sandbox-evasion-techniques
mukul975/Anthropic-Cybersecurity-Skills
493
Analyze Cuckoo Sandbox and AnyRun behavioral JSON reports to detect timing checks, VM artifacts, user interaction probes, and sleep inflation that signal malware trying to evade sandbox analysis, then map findings to MITRE ATT&CK T1497.
View Details
Compromise Indicator Collector
collecting-indicators-of-compromise
mukul975/Anthropic-Cybersecurity-Skills
92
Systematically collects and enriches IOCs from SIEM logs, memory analysis, and malware reports, then translates them into STIX/TAXII for defensive systems and trusted partners to detect, block, and share threat intelligence.
View Details
Threat Campaign Correlation
correlating-threat-campaigns
mukul975/Anthropic-Cybersecurity-Skills
388
Correlates disparate incidents, IOCs, and adversary behaviors using infrastructure, capability, temporal, and victimology pivots to build campaign graphs and intelligence reports for detection tuning and attribution.
View Details
Detect AWS IAM Escalation
detecting-aws-iam-privilege-escalation
mukul975/Anthropic-Cybersecurity-Skills
224
Analyzes AWS IAM policies via boto3 and Cloudsplaining-style logic to find privilege escalation paths, wildcard resources, and least-privilege violations, scoring risks and outputting JSON reports with remediation advice.
View Details
Zeek DNS Exfiltration Detection
detecting-exfiltration-over-dns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
387
Analyzes Zeek dns.log data to spot DNS-based exfiltration by measuring entropy, label length, subdomain volume, and query rates, then scores and reports suspicious domains for incident response.
View Details
Golden Ticket Detection
detecting-golden-ticket-forgery
mukul975/Anthropic-Cybersecurity-Skills
229
Detect Kerberos Golden Ticket forgery by analyzing Windows Event IDs 4768/4769 for RC4 downgrades, ticket lifetime violations, and krbtgt anomalies across Splunk or Elastic SIEM, producing risk-scored JSON reports tied to MITRE ATT&CK mapping.
View Details
WAF SQLi Detection
detecting-sql-injection-via-waf-logs
mukul975/Anthropic-Cybersecurity-Skills
342
Processes ModSecurity/AWS Cloudflare WAF logs to surface SQL injection campaigns, spotting UNION SELECT/OR 1=1/SLEEP payloads, clustering attacker IPs, correlating multi-stage requests, and issuing OWASP-classified incident reports.
View Details
Sqlmap Injection Exploit
exploiting-sql-injection-with-sqlmap
mukul975/Anthropic-Cybersecurity-Skills
254
Explains how to run sqlmap during authorized penetration tests to confirm SQL injection, enumerate databases/tables, extract sensitive data, test advanced exploits, bypass WAFs, and generate reports for remediation.
View Details
Canarytoken Deception Detection
implementing-deception-based-detection-with-canarytoken
mukul975/Anthropic-Cybersecurity-Skills
172
Automates Canary Tokens creation and monitoring via the Thinkst Canary API to deploy web, DNS, document, and AWS key tripwires, track alerts, and produce deception coverage reports for breach detection.
View Details
Greenbone Vulnerability Automation
implementing-vulnerability-management-with-greenbone
mukul975/Anthropic-Cybersecurity-Skills
240
Automate Greenbone/OpenVAS vulnerability management using python-gvm to create targets, execute GMP-driven scans, monitor progress, and parse XML reports into actionable JSON summaries with CVSS-aware findings.
View Details
ScoutSuite AWS Enumeration
performing-aws-account-enumeration-with-scout-suite
mukul975/Anthropic-Cybersecurity-Skills
69
ScoutSuite runs agentless queries against AWS APIs to enumerate resources, highlight misconfigurations, and output interactive HTML reports so teams can prioritize remediation and integrate scans into CI/CD pipelines.
View Details
Prev
1
2
3
4
Next
Language
简体中文
English