analyzing-network-traffic-for-incidents
mukul975/Anthropic-Cybersecurity-Skills
Examines packet captures, Zeek logs, and NetFlow data to uncover C2 channels, lateral movement, and exfiltration during security incidents, guiding analysts through capture, filtering, and IOC extraction workflows.