Login
Download
Skill UI
Browse and discover
6932+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
AI
, found
2426
results
Default
Newest
Most Downloaded
Kerberos Golden Ticket Hunt
detecting-golden-ticket-attacks-in-kerberos-logs
mukul975/Anthropic-Cybersecurity-Skills
83
Analyze domain controller Kerberos/TGT logs to detect Golden Ticket anomalies such as RC4 encryption, impossible lifetimes, forged PACs, and missing TGT events, enabling SOCs to hunt post-breach persistence or credential theft across AD environments.
View Details
Splunk Lateral Movement Detection
detecting-lateral-movement-with-splunk
mukul975/Anthropic-Cybersecurity-Skills
209
Guide to hunting lateral movement using Splunk SPL against Windows auth, SMB, and remote service abuse logs to trace credential theft, anomalous access, and threat paths for incident response.
View Details
Azure Storage Security Audit
detecting-misconfigured-azure-storage
mukul975/Anthropic-Cybersecurity-Skills
276
Automates detection of misconfigured Azure Storage accounts by checking for public blob containers, missing encryption, overly permissive SAS tokens, disabled logging, and loose network rules via Azure CLI/PowerShell/Defender for Storage across subscriptions.
View Details
IDS Scan Detection
detecting-network-scanning-with-ids-signatures
mukul975/Anthropic-Cybersecurity-Skills
101
Use Suricata or Snort IDS signatures, threshold rules, and traffic anomaly analysis to spot Nmap, Masscan, and custom port scans early in the kill chain and feed structured alerts for SOC handling.
View Details
Pass Hash Attack Detection
detecting-pass-the-hash-attacks
mukul975/Anthropic-Cybersecurity-Skills
88
Detects Pass-the-Hash attacks by analyzing NTLM logon patterns and correlating credential dumping telemetry via SIEM/EDR hunting, aiding proactive threat hunting, incident response, and purple-team exercises.
View Details
Fail2ban Port Scan Guard
detecting-port-scanning-with-fail2ban
mukul975/Anthropic-Cybersecurity-Skills
479
Configures Fail2ban with custom filters, iptables logging, and webhook ban actions to detect port scanning, SSH brute-force, and HTTP probes, automatically blocking offenders and notifying teams for faster incident response.
View Details
Kubernetes Privilege Escalation Detection
detecting-privilege-escalation-in-kubernetes-pods
mukul975/Anthropic-Cybersecurity-Skills
106
Monitors Kubernetes pods for privilege escalation by combining admission controls (Pod Security Admission, OPA Gatekeeper) with Falco runtime rules on capabilities, setuid binaries, and namespace usage so SOC analysts can block risky containers and hunt threats.
View Details
Process Hollowing Detection
detecting-process-hollowing-technique
mukul975/Anthropic-Cybersecurity-Skills
223
Detect process hollowing (T1055.012) by watching for anomalous memory-mapped sections, hollowed process indicators, and parent-child trait deviations in EDR telemetry, then correlating with suspicious network activity to hunt fileless threats.
View Details
Quishing Detection Workflow
detecting-qr-code-phishing-with-email-security
mukul975/Anthropic-Cybersecurity-Skills
226
Provides a workflow for detecting QR-code-based phishing that embeds malicious URLs in email images by enabling image OCR, extracting and scanning QR URLs, sandboxing destinations, and extending protection to mobile users plus awareness training.
View Details
Detecting RDP Brute Force
detecting-rdp-brute-force-attacks
mukul975/Anthropic-Cybersecurity-Skills
148
Analyzes Windows Security Event Logs to spot RDP brute-force patterns (Event IDs 4625/4624, NLA failures) and source IP frequency, then produces JSON reports for SOC analysts or detection rule tuning.
View Details
Detecting S3 Exfiltration
detecting-s3-data-exfiltration-attempts
mukul975/Anthropic-Cybersecurity-Skills
486
Detects unauthorized S3 mass downloads by correlating CloudTrail S3 events, GuardDuty findings, Macie alerts, and VPC logs, enabling security teams to spot cross-account transfers and respond swiftly.
View Details
Shadow IT Cloud Detection
detecting-shadow-it-cloud-usage
mukul975/Anthropic-Cybersecurity-Skills
103
Detect unauthorized SaaS and cloud service usage by analyzing proxy, DNS, and netflow logs with Python pandas to classify domains, measure usage metrics, and flag high-risk services for SOC analysts.
View Details
Prev
1
2
3
...
150
151
152
153
154
155
156
...
201
202
203
Next
Language
简体中文
English