Login
Download
Skill UI
Browse and discover
5987+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Cal
, found
1118
results
Default
Newest
Most Downloaded
Elastic SIEM Alert Triage
performing-alert-triage-with-elastic-siem
mukul975/Anthropic-Cybersecurity-Skills
394
Outlines a structured workflow inside Elastic Security SIEM for SOC analysts to triage alerts, investigate related activity with ES|QL queries, enrich findings via threat intelligence, and document escalation steps so teams can prioritize real threats and reduce noise.
View Details
Asset Criticality Scoring
performing-asset-criticality-scoring-for-vulns
mukul975/Anthropic-Cybersecurity-Skills
451
Build and apply a multi-factor asset criticality scoring model to weight vulnerability prioritization by business impact, data sensitivity, and recoverability so SLAs focus on the highest-risk systems.
View Details
AWS Privilege Escalation Audit
performing-aws-privilege-escalation-assessment
mukul975/Anthropic-Cybersecurity-Skills
463
Guides authorized testers through enumerating IAM policies, scanning known escalation techniques with Pacu, mapping trust graphs with PMapper, and validating cross-account roles to spot privilege escalation routes in AWS.
View Details
Blind SSRF Exploitation Guide
performing-blind-ssrf-exploitation
mukul975/Anthropic-Cybersecurity-Skills
194
Step-by-step methodology for detecting and exploiting blind Server-Side Request Forgery vulnerabilities using out-of-band callbacks, timing analysis, internal scanning, metadata access, and filter bypass techniques during web security assessments.
View Details
AWS CloudTrail Forensics
performing-cloud-forensics-with-aws-cloudtrail
mukul975/Anthropic-Cybersecurity-Skills
111
Use boto3, Athena, and the AWS CLI to query CloudTrail logs, reconstruct attacker timelines, surface suspicious API calls and credential abuse, then craft forensic reports for AWS incident response.
View Details
Cloud Native Falco Forensics
performing-cloud-native-forensics-with-falco
mukul975/Anthropic-Cybersecurity-Skills
344
Deploy Falco YAML rules to monitor containers and Kubernetes for runtime threats, parse alerts, and investigate compromises by catching shell spawns, file tampering, net anomalies, or privilege escalations.
View Details
AWS Cloud Pentest with Pacu
performing-cloud-penetration-testing-with-pacu
mukul975/Anthropic-Cybersecurity-Skills
267
Guides authorized AWS penetration testers through Pacu-based workflows for enumerating IAM, privilege escalation, data access, lateral movement, and detection validation to prove controls in scoped engagements.
View Details
Interactive Cloud Malware Analysis
performing-dynamic-analysis-with-any-run
mukul975/Anthropic-Cybersecurity-Skills
266
Uses ANY.RUN's cloud sandbox for interactive malware hunts, letting analysts trigger dialogs, monitor process trees, capture traffic, and export behavioral evidence without local infrastructure.
View Details
SIEM False Positive Reduction
performing-false-positive-reduction-in-siem
mukul975/Anthropic-Cybersecurity-Skills
106
Systematically reduce SIEM false positives through rule tuning, thresholds, correlation, allowlists, and threat intelligence enrichment while validating with Atomic Red Team runs and metrics to keep SOC analysts focused on true threats.
View Details
Foremost File Carving Guide
performing-file-carving-with-foremost
mukul975/Anthropic-Cybersecurity-Skills
106
Uses Foremost (with optional Scalpel follow-up) to carve files from raw disk images and unallocated space, customize signature configs, target specific formats, validate carved results, and assemble evidence during digital-forensics investigations.
View Details
GCP Bucket Pen Testing
performing-gcp-penetration-testing-with-gcpbucketbrute
mukul975/Anthropic-Cybersecurity-Skills
109
Use GCPBucketBrute plus gcloud IAM inspection to enumerate buckets, probe permissions, audit bindings, inspect service accounts, and map privilege escalation paths for cloud security testing.
View Details
Malware Persistence Analysis
performing-malware-persistence-investigation
mukul975/Anthropic-Cybersecurity-Skills
319
Systematically audit Windows and Linux autostart mechanisms, registry hives, scheduled tasks, and WMI entries to map how malware survives reboots and maintain access during incident response or threat hunting.
View Details
Prev
1
2
3
...
88
89
90
91
92
93
94
Next
Language
简体中文
English