Login
Download
Skill UI
Browse and discover
7044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
runtime
, found
67
results
Default
Newest
Most Downloaded
Kubernetes Privilege Escalation Detection
detecting-privilege-escalation-in-kubernetes-pods
mukul975/Anthropic-Cybersecurity-Skills
106
Monitors Kubernetes pods for privilege escalation by combining admission controls (Pod Security Admission, OPA Gatekeeper) with Falco runtime rules on capabilities, setuid binaries, and namespace usage so SOC analysts can block risky containers and hunt threats.
View Details
Docker Container Hardening
hardening-docker-containers-for-production
mukul975/Anthropic-Cybersecurity-Skills
471
Guides applying CIS Docker Benchmark best practices across daemon, image, runtime, and host auditing so teams can minimize attack surface, enforce least privilege, and verify secure production deployments.
View Details
API Posture Management
implementing-api-security-posture-management
mukul975/Anthropic-Cybersecurity-Skills
156
Helps continuously discover, classify, and risk-score every API while enforcing policies and aggregating findings from gateways, CI/CD, and runtime tooling to maintain an organization’s API security posture.
View Details
API Security Testing 42Crunch
implementing-api-security-testing-with-42crunch
mukul975/Anthropic-Cybersecurity-Skills
58
Use 42Crunch to run static API Audit and dynamic conformance scans on OpenAPI specs, integrating with IDEs and CI/CD pipelines to detect OWASP API Top 10 issues before deployment and maintain runtime compliance.
View Details
Cloud Workload Protection
implementing-cloud-workload-protection
mukul975/Anthropic-Cybersecurity-Skills
497
Implements runtime protection for EC2/GCE workloads using boto3 and Google Cloud APIs; monitors processes, files, networks, and resource usage to detect cryptomining, reverse shells, and unauthorized binaries during security deployments.
View Details
Runtime Application Protection
implementing-runtime-application-self-protection
mukul975/Anthropic-Cybersecurity-Skills
319
Deploy RASP agents for Java and Python web apps to detect and block OWASP Top 10 attacks from inside the runtime, tune detection policies, baseline behavior, and forward telemetry to SIEM for comprehensive audit and response.
View Details
Runtime Security with Tetragon
implementing-runtime-security-with-tetragon
mukul975/Anthropic-Cybersecurity-Skills
403
Implement eBPF-powered runtime security observability and enforcement in Kubernetes with Cilium Tetragon, letting teams define TracingPolicy CRDs, monitor process/file/network activities, and block threats before they escape containers.
View Details
ZAP DAST Pipeline Integration
integrating-dast-with-owasp-zap-in-pipeline
mukul975/Anthropic-Cybersecurity-Skills
301
Explains configuring OWASP ZAP baseline, full, and API scans within CI/CD pipelines, tuning scan policies, interpreting findings, and gating deployments through GitHub Actions or GitLab CI to ensure runtime vulnerabilities are caught before release.
View Details
Falco Cloud Forensics
performing-cloud-native-forensics-with-falco
mukul975/Anthropic-Cybersecurity-Skills
55
Use Falco YAML rules and the Falco gRPC API to monitor syscalls and runtime behavior in containers or Kubernetes, catching shell spawns, file tampering, network anomalies, and privilege escalation while parsing alerts to support incident response and security testing.
View Details
Docker Bench Security Audit
performing-docker-bench-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
205
Run Docker Bench for Security to automate CIS-aligned audits of host settings, daemon configs, images, runtime, and remediation steps, helping ops teams validate Docker deployments before production and during incident response.
View Details
Dynamic Android Analysis
performing-dynamic-analysis-of-android-app
mukul975/Anthropic-Cybersecurity-Skills
192
Analyzes Android applications at runtime with Frida, Objection, and ADB to hook sensitive methods, observe decrypted data, bypass anti-debug/root checks, and monitor live network traffic during penetration tests or runtime debugging.
View Details
IoT Security Assessment
performing-iot-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
186
Performs comprehensive IoT device security assessments, combining hardware interface testing, firmware extraction, runtime exploitation, and network/cloud/mobile analysis to find vulnerabilities before deployment or for product reviews.
View Details
Prev
1
2
3
4
5
6
Next
Language
简体中文
English