Login
Download
Skill UI
Browse and discover
6932+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
CI
, found
2182
results
Default
Newest
Most Downloaded
Trivy Container Security Scanning
performing-container-security-scanning-with-trivy
mukul975/Anthropic-Cybersecurity-Skills
78
Uses Aqua Security Trivy to scan container images, filesystems, IaC, and Kubernetes manifests for vulnerabilities, secrets, and license issues while generating SBOMs and integrating into CI/CD pipelines for triage-ready reports.
View Details
Cryptographic Audit Automation
performing-cryptographic-audit-of-application
mukul975/Anthropic-Cybersecurity-Skills
487
Automated skill that scans Python and configuration files to review cryptographic primitives, insecure modes, embedded secrets, and TLS settings, flagging weaknesses and producing structured remediation reports during app security assessments.
View Details
CSRF Attack Simulation
performing-csrf-attack-simulation
mukul975/Anthropic-Cybersecurity-Skills
174
Simulates CSRF attacks during authorized penetration tests to exercise state-changing endpoints, evaluate anti-CSRF tokens, SameSite cookies, and header checks, then craft PoCs via Burp Suite for remediation insight.
View Details
KEV CVE Prioritization
performing-cve-prioritization-with-kev-catalog
mukul975/Anthropic-Cybersecurity-Skills
102
Combine the CISA KEV catalog with EPSS, CVSS, asset criticality, and network exposure to drive a risk-based CVE prioritization workflow for faster remediation of exploited vulnerabilities.
View Details
Disk Forensics Investigation
performing-disk-forensics-investigation
mukul975/Anthropic-Cybersecurity-Skills
183
Performs disk forensics investigations through imaging, filesystem analysis, artifact recovery, and timeline reconstruction to support incident response and legal evidence needs on compromised storage.
View Details
DNS Tunneling Detection
performing-dns-tunneling-detection
mukul975/Anthropic-Cybersecurity-Skills
129
Monitors DNS traffic using entropy, query-length, TXT volume, and subdomain cardinality analysis to surface covert channels during incident response or proactive security assessments.
View Details
Docker Bench Security Audit
performing-docker-bench-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
205
Run Docker Bench for Security to automate CIS-aligned audits of host settings, daemon configs, images, runtime, and remediation steps, helping ops teams validate Docker deployments before production and during incident response.
View Details
Endpoint Forensics Investigation
performing-endpoint-forensics-investigation
mukul975/Anthropic-Cybersecurity-Skills
475
Performs endpoint digital forensics by capturing memory and disk images, analyzing artifacts, and rebuilding timelines to support incident investigations and legal evidence collection.
View Details
SailPoint IIQ Entitlement Review
performing-entitlement-review-with-sailpoint-iiq
mukul975/Anthropic-Cybersecurity-Skills
425
Automates entitlement review, certification campaigns, and remediation workflows with SailPoint IdentityIQ to validate access, target sensitive applications, enforce SoD policies, and provide evidence for periodic compliance campaigns such as SOX or HIPAA.
View Details
External Network Penetration
performing-external-network-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
301
Perform a PTES/OSSTMM-aligned external network penetration test that scans internet-facing assets, validates vulnerabilities via reconnaissance, exploitation, and reporting, and informs remediation before attackers strike.
View Details
SIEM False Positive Reduction
performing-false-positive-reduction-in-siem
mukul975/Anthropic-Cybersecurity-Skills
368
Systematically tune SIEM rules, thresholds, allowlists, correlations, and enrichment so SOC analysts can focus on genuine threats instead of alert fatigue, especially during security assessments and incident response cycles.
View Details
Forseti GCP Security Audit
performing-gcp-security-assessment-with-forseti
mukul975/Anthropic-Cybersecurity-Skills
370
Guides security teams through Forseti, SCC, and gcloud workflows to audit IAM policies, firewall rules, bucket permissions, and CIS benchmark compliance across GCP organizations with optional ScoutSuite comparison and BigQuery exports for analysis.
View Details
Prev
1
2
3
...
139
140
141
142
143
144
145
...
180
181
182
Next
Language
简体中文
English