Login
Download
Skill UI
Browse and discover
7039+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Art
, found
490
results
Default
Newest
Most Downloaded
Registry Run Key Hunting
hunting-for-registry-run-key-persistence
mukul975/Anthropic-Cybersecurity-Skills
396
Hunts registry Run key persistence by parsing Sysmon Event ID 13 logs, flagging suspicious auto-start entries, correlating with process/file creation events, and building Sigma/Splunk rules.
View Details
Startup Folder Persistence Hunt
hunting-for-startup-folder-persistence
mukul975/Anthropic-Cybersecurity-Skills
296
Detect T1547.001 startup folder persistence by scanning Windows startup directories, analyzing metadata via autoruns, and watching folders with Python watchdog to produce JSON reports and alerts for suspicious implants.
View Details
Supply Chain Compromise Hunt
hunting-for-supply-chain-compromise
mukul975/Anthropic-Cybersecurity-Skills
311
Track trojanized updates, compromised dependencies, unauthorized code edits, and tampered build artifacts by querying EDR/SIEM telemetry, correlating indicators, and documenting findings for rapid response in proactive threat-hunting campaigns.
View Details
Centralized AWS Security Hub
implementing-aws-security-hub
mukul975/Anthropic-Cybersecurity-Skills
331
Deploys AWS Security Hub as a centralized CSPM to aggregate GuardDuty, Inspector, Macie, and partner findings, enforce CIS/AWS/PCI standards, and drive automated remediation plus compliance reporting across multi-account AWS estates.
View Details
Artifact Code Signing
implementing-code-signing-for-artifacts
mukul975/Anthropic-Cybersecurity-Skills
414
Defines how to sign build artifacts such as binaries, packages, and containers using GPG, Sigstore, and platform tools so CI/CD pipelines can attest integrity and enable trustworthy deployments.
View Details
End-to-End Messaging Encryption
implementing-end-to-end-encryption-for-messaging
mukul975/Anthropic-Cybersecurity-Skills
115
Implements a simplified Signal Protocol stack with X25519 key exchange, HKDF derivation, AES-256-GCM per-message encryption, ratcheting chains, and replay protections so only communicating parties can read messages in secure deployments.
View Details
Google Workspace SSO Setup
implementing-google-workspace-sso-configuration
mukul975/Anthropic-Cybersecurity-Skills
82
Guide to configure SAML 2.0 SSO for Google Workspace with a third-party IdP, centralizing authentication, enforcing MFA, and managing scoped profile assignments, network masks, and testing flows to secure organizational access.
View Details
IEC 62443 OT Segmentation
implementing-iec-62443-security-zones
mukul975/Anthropic-Cybersecurity-Skills
263
Guides designing IEC 62443-3-2 compliant OT security zones and conduits, covering risk-based partitioning, Security Level targets, conduit controls, microsegmentation with industrial firewalls, and validating the zone architecture through traffic analysis and testing.
View Details
Phishing SOAR Playbook Automation
implementing-soar-playbook-for-phishing
mukul975/Anthropic-Cybersecurity-Skills
122
Automates phishing incident response by parsing suspicious emails, creating Splunk SOAR containers and artifacts via the REST API, and triggering investigation playbooks while polling for results to deliver summarized verdicts.
View Details
Velociraptor Incident Response Collection
implementing-velociraptor-for-ir-collection
mukul975/Anthropic-Cybersecurity-Skills
319
Guide for deploying Velociraptor to scale forensic artifact collection across Windows, Linux, and macOS, including server/client setup, Docker options, and VQL artifacts used during incident response hunts and compliance-driven monitoring.
View Details
Insider Threat Investigation
investigating-insider-threat-indicators
mukul975/Anthropic-Cybersecurity-Skills
141
Guides SOC analysts through SIEM, DLP, UEBA, and HR data correlation to investigate data exfiltration, unauthorized access, and pre-departure anomalies for insider threats.
View Details
Ransomware Artifact Investigation
investigating-ransomware-attack-artifacts
mukul975/Anthropic-Cybersecurity-Skills
354
Guide to collecting and analyzing ransomware artifacts—notes, encrypted samples, logs—to identify variants, trace the attack chain, and support recovery or legal follow-up.
View Details
Prev
1
2
3
...
28
29
30
31
32
33
34
...
39
40
41
Next
Language
简体中文
English