Login
Download
Skill UI
Browse and discover
6252+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
ransomware
, found
18
results
Default
Newest
Most Downloaded
CISA Ransomware Playbook Builder
building-ransomware-playbook-with-cisa-framework
mukul975/Anthropic-Cybersecurity-Skills
52
Generates a CISA StopRansomware and NIST CSF-aligned ransomware response playbook with actionable checklists for preparation, detection, containment, eradication, recovery, and post-incident refinement when planning or assessing readiness.
View Details
Ransomware Canary Deployment
deploying-decoy-files-for-ransomware-detection
mukul975/Anthropic-Cybersecurity-Skills
450
Deploys honeytoken decoy files across critical shares and endpoints, watches them with file-integrity or OS-level observers, and alerts SOCs when ransomware modifies, encrypts, or renames a canary, offering a precise detection layer that complements backups and EDR.
View Details
Anti-Ransomware GPO Hardening
implementing-anti-ransomware-group-policy
mukul975/Anthropic-Cybersecurity-Skills
160
Guides administrators through configuring Windows Group Policy Objects to block ransomware execution paths, enable AppLocker, Controlled Folder Access, ASR rules, and restrict lateral movement, making GPOs part of a broader defense-in-depth strategy.
View Details
Ransomware Kill Switch Defense
implementing-ransomware-kill-switch-detection
mukul975/Anthropic-Cybersecurity-Skills
66
Analyzes ransomware samples to spot mutex, domain, registry, file, or language kill switches, then vaccinate endpoints with known mutexes and monitor Sysmon/DNS telemetry to block variants before execution.
View Details
Ransomware Recovery Testing
testing-ransomware-recovery-procedures
mukul975/Anthropic-Cybersecurity-Skills
277
Validates ransomware recovery plans by simulating restores, measuring RTO/RPO, and confirming data integrity so teams know backup workflows meet resilience goals.
View Details
Backup Integrity Validation
validating-backup-integrity-for-recovery
mukul975/Anthropic-Cybersecurity-Skills
103
Validates backup integrity via hash manifests, restore tests, and anomaly detection, ensuring recovery readiness for ransomware or disaster response pipelines. Use it in CI/CD backup validation schedules, restore drills, and compliance audits.
View Details
Prev
1
2
Language
简体中文
English