Login
Download
Skill UI
Browse and discover
7087+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
validation
, found
496
results
Default
Newest
Most Downloaded
Network Penetration Assessment
conducting-network-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
360
Guides comprehensive pen tests covering discovery, scanning, enumeration, vulnerability validation, controlled exploitation, and reporting to benchmark network security and compliance readiness.
View Details
Secure OAuth2 Flows
configuring-oauth2-authorization-flow
mukul975/Anthropic-Cybersecurity-Skills
129
Configures OAuth 2.0 flows (Authorization Code with PKCE, Client Credentials, Device Authorization) with secure scope, token lifecycle, PKCE validation, and RFC 9700 guidance so teams can deploy compliant IAM controls.
View Details
DNS Exfiltration Detection with Zeek
detecting-exfiltration-over-dns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
441
Analyzes Zeek dns.log to flag DNS tunneling by computing subdomain entropy, long labels, unique counts and query volumes, scoring domains and emitting structured JSON reports for SOC investigations and monitoring validation.
View Details
Detecting Pass-the-Ticket
detecting-pass-the-ticket-attacks
mukul975/Anthropic-Cybersecurity-Skills
210
Detect Kerberos Pass-the-Ticket attacks by correlating Windows Security Event IDs 4768, 4769, and 4771 inside Splunk or Elastic SIEM, flagging ticket reuse, RC4 downgrades, and unusual service ticket volumes for SOC hunting and coverage validation.
View Details
Service Account Abuse Detection
detecting-service-account-abuse
mukul975/Anthropic-Cybersecurity-Skills
225
Structured threat-hunting workflow that detects anomalous service-account logons, lateral movement, and privilege escalation by guiding analysts through hypothesis formation, SIEM/EDR querying, correlation and validation for proactive response.
View Details
Metasploit Vulnerability Validation
exploiting-vulnerabilities-with-metasploit-framework
mukul975/Anthropic-Cybersecurity-Skills
247
Guide to using the Metasploit Framework to validate and exploit verified vulnerabilities, document impact, scan auxiliary vectors, and confirm patches within a risk-based vulnerability management cycle.
View Details
AgentTesla Config Extractor
extracting-config-from-agent-tesla-rat
mukul975/Anthropic-Cybersecurity-Skills
429
Extract embedded Agent Tesla RAT configuration such as SMTP/FTP/Telegram exfiltration credentials, keylogger settings, and C2 data from .NET assemblies via dnSpy/ILSpy decompilation and memory analysis for malware research or red-team validation.
View Details
Secure Windows CIS Hardening
hardening-windows-endpoint-with-cis-benchmark
mukul975/Anthropic-Cybersecurity-Skills
111
Hardens Windows endpoints using CIS Benchmark guidance to reduce attack surface, enforce security baselines, and stay compliant when commissioning new workstations, servers, or remediating audit findings through GPO deployments and CIS-CAT validation.
View Details
Secure API Schema Validation
implementing-api-schema-validation-security
mukul975/Anthropic-Cybersecurity-Skills
491
Implements OpenAPI/JSON Schema validation so API gateways and CI pipelines enforce request and response contracts, blocking injection, mass assignment, and data-leakage risks while keeping type safety across deployments.
View Details
Apigee API Threat Protection
implementing-api-threat-protection-with-apigee
mukul975/Anthropic-Cybersecurity-Skills
162
Implements Apigee-native policies (JSON/XML threat protection, OAuth2 validation, SpikeArrest, regex abuse detection and API key checks) to shield backend services and meet OWASP/API compliance controls.
View Details
Continuous Security Validation
implementing-continuous-security-validation-with-bas
mukul975/Anthropic-Cybersecurity-Skills
216
Automates continuous validation of security controls by emulating real attack techniques with BAS platforms such as SafeBreach, AttackIQ, or Cymulate, aligning results with MITRE ATT&CK and operational readiness.
View Details
BitLocker Disk Encryption
implementing-disk-encryption-with-bitlocker
mukul975/Anthropic-Cybersecurity-Skills
303
Implements full BitLocker disk encryption on Windows endpoints, covering TPM validation, GPO tuning, Intune deployment, recovery key escrow, and monitoring to help enterprises meet compliance and protect data at rest.
View Details
Prev
1
2
3
...
34
35
36
37
38
39
40
41
42
Next
Language
简体中文
English