Login
Download
Skill UI
Browse and discover
7044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
AI-Detection
, found
107
results
Default
Newest
Most Downloaded
Active Directory DCSync Detection
detecting-dcsync-attack-in-active-directory
mukul975/Anthropic-Cybersecurity-Skills
353
Hunts for DCSync attacks by monitoring Active Directory replication requests, auditing Event ID 4662, correlating non-domain-controller RPC traffic, and alerting when unauthorized accounts request replication rights to detect credential theft.
View Details
DNS Query Exfiltration Detection
detecting-dns-exfiltration-with-dns-query-analysis
mukul975/Anthropic-Cybersecurity-Skills
349
Builds a passive DNS analysis pipeline that flags DNS tunneling attempts by inspecting query entropy, subdomain length, volume spikes, TXT abuses, and response payload sizes so SOCs can detect exfiltrating data hidden in DNS traffic.
View Details
DNS Exfiltration Detection with Zeek
detecting-exfiltration-over-dns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
420
Analyzes Zeek dns.log to flag DNS tunneling by computing subdomain entropy, long labels, unique counts and query volumes, scoring domains and emitting structured JSON reports for SOC investigations and monitoring validation.
View Details
Splunk Lateral Movement Detection
detecting-lateral-movement-with-splunk
mukul975/Anthropic-Cybersecurity-Skills
209
Guide to hunting lateral movement using Splunk SPL against Windows auth, SMB, and remote service abuse logs to trace credential theft, anomalous access, and threat paths for incident response.
View Details
Azure Storage Security Audit
detecting-misconfigured-azure-storage
mukul975/Anthropic-Cybersecurity-Skills
276
Automates detection of misconfigured Azure Storage accounts by checking for public blob containers, missing encryption, overly permissive SAS tokens, disabled logging, and loose network rules via Azure CLI/PowerShell/Defender for Storage across subscriptions.
View Details
IDS Scan Detection
detecting-network-scanning-with-ids-signatures
mukul975/Anthropic-Cybersecurity-Skills
101
Use Suricata or Snort IDS signatures, threshold rules, and traffic anomaly analysis to spot Nmap, Masscan, and custom port scans early in the kill chain and feed structured alerts for SOC handling.
View Details
Pass Hash Attack Detection
detecting-pass-the-hash-attacks
mukul975/Anthropic-Cybersecurity-Skills
88
Detects Pass-the-Hash attacks by analyzing NTLM logon patterns and correlating credential dumping telemetry via SIEM/EDR hunting, aiding proactive threat hunting, incident response, and purple-team exercises.
View Details
Kubernetes Privilege Escalation Detection
detecting-privilege-escalation-in-kubernetes-pods
mukul975/Anthropic-Cybersecurity-Skills
106
Monitors Kubernetes pods for privilege escalation by combining admission controls (Pod Security Admission, OPA Gatekeeper) with Falco runtime rules on capabilities, setuid binaries, and namespace usage so SOC analysts can block risky containers and hunt threats.
View Details
Process Hollowing Detection
detecting-process-hollowing-technique
mukul975/Anthropic-Cybersecurity-Skills
223
Detect process hollowing (T1055.012) by watching for anomalous memory-mapped sections, hollowed process indicators, and parent-child trait deviations in EDR telemetry, then correlating with suspicious network activity to hunt fileless threats.
View Details
Quishing Detection Workflow
detecting-qr-code-phishing-with-email-security
mukul975/Anthropic-Cybersecurity-Skills
226
Provides a workflow for detecting QR-code-based phishing that embeds malicious URLs in email images by enabling image OCR, extracting and scanning QR URLs, sandboxing destinations, and extending protection to mobile users plus awareness training.
View Details
Detecting RDP Brute Force
detecting-rdp-brute-force-attacks
mukul975/Anthropic-Cybersecurity-Skills
148
Analyzes Windows Security Event Logs to spot RDP brute-force patterns (Event IDs 4625/4624, NLA failures) and source IP frequency, then produces JSON reports for SOC analysts or detection rule tuning.
View Details
Shadow IT Cloud Detection
detecting-shadow-it-cloud-usage
mukul975/Anthropic-Cybersecurity-Skills
103
Detect unauthorized SaaS and cloud service usage by analyzing proxy, DNS, and netflow logs with Python pandas to classify domains, measure usage metrics, and flag high-risk services for SOC analysts.
View Details
Prev
1
2
3
4
5
6
7
8
9
Next
Language
简体中文
English