Login
Download
Skill UI
Browse and discover
6186+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Auth
, found
548
results
Default
Newest
Most Downloaded
Exploiting AD CS ESC1
exploiting-active-directory-certificate-services-esc1
mukul975/Anthropic-Cybersecurity-Skills
383
Guide to abusing misconfigured Active Directory Certificate Services ESC1 templates to request certificates as high-privileged users, forge Domain Admin certs, authenticate via PKINIT, and escalate domain privileges during authorized red team exercises.
View Details
BloodHound Active Directory Recon
exploiting-active-directory-with-bloodhound
mukul975/Anthropic-Cybersecurity-Skills
79
BloodHound is a graph-based Active Directory reconnaissance workflow that helps red teams collect AD data with SharpHound or BloodHound.py, visualize attack paths, and document privilege escalation chains during authorized testing and response planning.
View Details
API Injection Testing
exploiting-api-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
386
Simulates malicious API requests to probe SQL, NoSQL, LDAP, command injection, and SSRF entry points, helping teams validate input controls and backend misconfigurations during authorized security assessments.
View Details
Broken Function Authorization Testing
exploiting-broken-function-level-authorization
mukul975/Anthropic-Cybersecurity-Skills
123
Detects Broken Function Level Authorization by enumerating admin endpoints, probing with regular user sessions, and validating role enforcement to reveal API privilege escalation paths during penetration tests.
View Details
Constrained Delegation Abuse
exploiting-constrained-delegation-abuse
mukul975/Anthropic-Cybersecurity-Skills
304
Explains how to abuse Kerberos constrained delegation misconfigurations in Active Directory to impersonate privileged accounts via S4U2self/S4U2proxy, secure service tickets, and access CIFS/LDAP/HTTP targets for lateral movement and privilege escalation during red-team or authorized security exercises.
View Details
Deep Link Exploitation
exploiting-deeplink-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
486
Automates testing and exploitation of mobile app deep link handlers (custom schemes, App Links, Universal Links) to surface unauthorized access, injection, hijacking, and WebView loading flaws during security assessments.
View Details
Exploiting IDOR Vulnerabilities
exploiting-idor-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
213
Guides security testers through identifying and exploiting IDOR flaws, covering endpoint mapping, Burp Authorize setup, horizontal/vertical access checks, and non-obvious request vectors to confirm broken object-level authorization.
View Details
IPv6 Vulnerability Exploitation
exploiting-ipv6-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
160
Conducts authorized IPv6 penetration tests by enumerating dual-stack hosts, spoofing router advertisements, launching SLAAC MITM, manipulating neighbor discovery, and spotting tunneling protocols to validate IPv6-aware defenses during security assessments.
View Details
JWT Algorithm Confusion
exploiting-jwt-algorithm-confusion-attack
mukul975/Anthropic-Cybersecurity-Skills
73
Guides testers through exploiting JWT algorithm confusion flaws by inspecting valid tokens, retrieving public keys, and crafting HS256/none attacks or key injections to bypass signature verification during authorized assessments.
View Details
Mass Assignment API Exploit
exploiting-mass-assignment-in-rest-apis
mukul975/Anthropic-Cybersecurity-Skills
297
Guide for discovering and exploiting mass assignment vulnerabilities in REST APIs, useful during API security assessments and bug bounty work to inject unexpected parameters, escalate privileges, and bypass authorization controls.
View Details
EternalBlue Exploitation Guide
exploiting-ms17-010-eternalblue-vulnerability
mukul975/Anthropic-Cybersecurity-Skills
211
Provides a structured workflow for scanning, exploiting, and post-exploitation when safely testing MS17-010 EternalBlue in authorized engagements, including detection indicators and required tooling for proof-of-concept campaigns.
View Details
NoSQL Injection Exploits
exploiting-nosql-injection-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
351
Guide for identifying and exploiting NoSQL injection flaws in MongoDB, CouchDB, and similar databases to bypass authentication, extract data, and expose risky query handling during pentests or bug bounties.
View Details
Prev
1
2
3
...
33
34
35
36
37
38
39
...
44
45
46
Next
Language
简体中文
English