Login
Download
Skill UI
Browse and discover
5986+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Command-and-Control
, found
15
results
Default
Newest
Most Downloaded
Instantly Enterprise RBAC
instantly-enterprise-rbac
jeremylongshore/claude-code-plugins-plus-skills
450
Guides configuring Instantly enterprise SSO, role-based access control, and workspace-wide campaign/account visibility while detailing API/CLI commands to onboard members, assign sending accounts, and monitor deliverability.
View Details
Linux Commands Guide
linux-commands-guide
jeremylongshore/claude-code-plugins-plus-skills
105
Automated Linux Commands Guide skill offers step-by-step help with foundational DevOps tasks such as version control, containerization, CI/CD, and infrastructure routines whenever you mention linux commands guide.
View Details
Autonomous Development Control
managing-autonomous-development
jeremylongshore/claude-code-plugins-plus-skills
146
Enables Claude to orchestrate Sugar's autonomous development workflows by creating tasks, checking system status, reviewing pending work, and triggering autonomous execution via recognized commands.
View Details
Shortcut Project Automation
shortcut-automation
ComposioHQ/awesome-claude-skills
131
Shortcut Automation lets you control Shortcut project management directly from Claude Code using natural-language commands to create or batch stories, list workflows and projects, add tasks or comments, and keep epics and workflows organized without leaving your terminal.
View Details
Odoo Automated Testing
odoo-automated-tests
sickn33/antigravity-awesome-skills
279
Guides writing and running Odoo TransactionCase, HttpCase, and browser-tour tests, covering setup, tagging, and CLI commands so you can add CI-friendly automation for models and controllers.
View Details
Command-and-Control Analysis
analyzing-command-and-control-communication
mukul975/Anthropic-Cybersecurity-Skills
399
Analyzes malware command-and-control (C2) communication by profiling protocols, beaconing behavior, and payload structure to inform detection, reverse engineering, and threat intelligence workflows.
View Details
Network Incident Traffic Analysis
analyzing-network-traffic-for-incidents
mukul975/Anthropic-Cybersecurity-Skills
105
Analyzes PCAP captures, Zeek logs, and NetFlow flow data to uncover command-and-control, lateral movement, and exfiltration during security incidents; supports packet-level validation and IOC extraction for triage and response teams.
View Details
Adversary Infrastructure Tracking
building-adversary-infrastructure-tracking-system
mukul975/Anthropic-Cybersecurity-Skills
434
Builds an automated system that ingests passive DNS, certificate transparency, WHOIS, and IP enrichment data to map adversary command-and-control infrastructure, spot new domains matching attacker patterns, and continuously monitor their relationships.
View Details
Sliver C2 Infrastructure
building-c2-infrastructure-with-sliver-framework
mukul975/Anthropic-Cybersecurity-Skills
195
Guide to deploying and hardening a resilient Sliver command-and-control infrastructure, covering team server provisioning, HTTPS/mTLS/DNS/WireGuard listeners, redirectors, implant generation, and post-exploitation operations for authorized red-team engagements.
View Details
Detect DNP3 Anomalies
detecting-dnp3-protocol-anomalies
mukul975/Anthropic-Cybersecurity-Skills
208
Detect anomalies in SCADA DNP3 traffic by monitoring for unauthorized control commands, protocol violations, firmware update attempts, and unusual baselines through deep packet inspection and ML-enabled heuristics.
View Details
Beaconing Frequency Hunting
hunting-for-beaconing-with-frequency-analysis
mukul975/Anthropic-Cybersecurity-Skills
441
Applies statistical frequency analysis, jitter scoring, and telemetry enrichment to detect command-and-control beaconing patterns and prioritize suspicious periodic callbacks for proactive threat hunting.
View Details
Detect C2 Beaconing Patterns
hunting-for-command-and-control-beaconing
mukul975/Anthropic-Cybersecurity-Skills
469
Detect C2 beaconing patterns by analyzing network telemetry for regular intervals, jitter, and domain reputation to find compromised endpoints communicating with adversary infrastructure before outbreaks escalate.
View Details
1
2
Next
Language
简体中文
English