Login
Download
Skill UI
Browse and discover
7044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
AI-Detection
, found
107
results
Default
Newest
Most Downloaded
Cloud Incident Response
conducting-cloud-incident-response
mukul975/Anthropic-Cybersecurity-Skills
403
Guides responders through cloud incident response operations across AWS, Azure, and GCP, covering detection, identity containment, isolation, and forensic evidence preservation.
View Details
Full-Scope Red Teaming
conducting-full-scope-red-team-engagement
mukul975/Anthropic-Cybersecurity-Skills
252
Guides planning and executing MITRE ATT&CK-aligned red team engagements from reconnaissance through reporting, emphasizing stealthy payloads, lateral movement, defined objectives like domain dominance and data exfiltration, and the legal/prerequisite controls needed to validate detection and response readiness.
View Details
Host-Based Intrusion Configuration
configuring-host-based-intrusion-detection
mukul975/Anthropic-Cybersecurity-Skills
59
Guides configuring host-based intrusion detection (HIDS) with Wazuh/OSSEC/AIDE, covering agent installs, file integrity monitoring, rootkit checks, log rules, and active responses so endpoints stay compliant and feed SIEMs.
View Details
Threat Campaign Correlation
correlating-threat-campaigns
mukul975/Anthropic-Cybersecurity-Skills
331
Correlates disparate incidents, IOCs, and behaviors across organizations to reveal unified threat campaigns, attribute them to actors, and surface shared indicators for detection and reporting.
View Details
API Enumeration Detection
detecting-api-enumeration-attacks
mukul975/Anthropic-Cybersecurity-Skills
247
Detects API enumeration attacks such as BOLA and IDOR by monitoring sequential or tampered object identifiers, analyzing authorization failures, and alerting on abnormal request patterns across gateways and SIEMs.
View Details
ARP Poisoning Detection Guide
detecting-arp-poisoning-in-network-traffic
mukul975/Anthropic-Cybersecurity-Skills
342
Provides layered procedures for spotting ARP spoofing attempts via ARPWatch alerts, Dynamic ARP Inspection configuration, Wireshark filters, and custom Python monitors to protect against man-in-the-middle interception on local networks.
View Details
AWS IAM Escalation Detection
detecting-aws-iam-privilege-escalation
mukul975/Anthropic-Cybersecurity-Skills
294
Uses boto3 plus Cloudsplaining-style policy analysis to detect AWS IAM privilege escalation paths, highlight dangerous permission combinations, and deliver structured remediation guidance for SOC and security teams.
View Details
AI BEC Detection System
detecting-business-email-compromise-with-ai
mukul975/Anthropic-Cybersecurity-Skills
318
Deploys AI and NLP-powered detection to spot business email compromise by analyzing writing style, behavioral context, and intent, then integrates baselines, transformer models, and response workflows to surface impersonation attempts that rule-based filters miss.
View Details
Cloud Cryptomining Detection
detecting-cloud-cryptomining-activity
mukul975/Anthropic-Cybersecurity-Skills
461
Detect unauthorized crypto-mining in AWS, Azure, and GCP by correlating GuardDuty/Defender/SCC findings, compute anomalies, network flows, and container/serverless behaviors to validate threats and guide response.
View Details
Container Drift Runtime Detection
detecting-container-drift-at-runtime
mukul975/Anthropic-Cybersecurity-Skills
167
Detecting runtime container drift by tracking unauthorized binaries, filesystem writes, package installs, and configuration deviations from original images, enabling SOC analysts to hunt threats and validate Kubernetes workload integrity with tools like Falco.
View Details
Container Escape Detection
detecting-container-escape-attempts
mukul975/Anthropic-Cybersecurity-Skills
372
Blueprint for using runtime monitoring (Falco, auditd, custom rules) to spot namespace/capability abuse, sensitive mounts, and syscalls that signal container escape attempts.
View Details
Falco Container Escape Detection
detecting-container-escape-with-falco-rules
mukul975/Anthropic-Cybersecurity-Skills
482
Uses Falco runtime security rules to monitor syscalls, file access, and privilege escalations for detecting container escape attempts across Kubernetes and standalone Linux deployments.
View Details
Prev
1
2
3
4
5
6
7
8
9
Next
Language
简体中文
English