Login
Download
Skill UI
Browse and discover
6252+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Credential-Attacks
, found
9
results
Default
Newest
Most Downloaded
Active Directory Offense Guide
active-directory-attacks
sickn33/antigravity-awesome-skills
115
Provides offensive operators with a full Active Directory attack playbook covering reconnaissance, credential harvesting, Kerberos abuses, lateral movement, privilege escalation, and persistence tools for red team and penetration engagements.
View Details
SSH Penetration Testing
ssh-penetration-testing
sickn33/antigravity-awesome-skills
193
Guides SSH service security assessments from discovery, enumeration, credential attacks and key testing to tunneling, vulnerability exploitation, and reporting deliverables.
View Details
DCSync Domain Persistence
conducting-domain-persistence-with-dcsync
mukul975/Anthropic-Cybersecurity-Skills
193
Guide to using DCSync attacks to replicate Active Directory credentials, extract KRBTGT and Domain Admin hashes, forge Golden Tickets, and sustain domain persistence during authorized assessments.
View Details
Kerberos Golden Ticket Detection
detecting-golden-ticket-attacks-in-kerberos-logs
mukul975/Anthropic-Cybersecurity-Skills
386
Analyze domain controller Kerberos logs to spot Golden Ticket TGT anomalies such as RC4 encryption, impossible lifetimes, missing TGT requests, and forged PAC signatures, letting SOC teams hunt credential abuse and persistent AD footholds with Splunk or KQL queries.
View Details
Kerberoasting Detection Guide
detecting-kerberoasting-attacks
mukul975/Anthropic-Cybersecurity-Skills
60
Documented workflow for hunting Kerberoasting activity by correlating SIEM and EDR telemetry, validating findings, and reporting observations so defenders can proactively detect Credential Access abuse.
View Details
Pass The Hash Detection
detecting-pass-the-hash-attacks
mukul975/Anthropic-Cybersecurity-Skills
288
Detecting Pass-the-Hash attacks by correlating NTLM Type 3 logons, telemetry from EDR/SIEM, and credential-dumping IOCs to proactively hunt and validate incidents across Windows estates.
View Details
Credential Stuffing Hunting
hunting-credential-stuffing-attacks
mukul975/Anthropic-Cybersecurity-Skills
224
Analyzes authentication logs in Splunk or raw CSV to surface credential stuffing activity by tracking login velocity, ASN distribution, password sprays, and geolocation anomalies for SOC investigations.
View Details
Detect DCSync Threats
hunting-for-dcsync-attacks
mukul975/Anthropic-Cybersecurity-Skills
318
Guide for hunting DCSync credential theft by analyzing Windows Event ID 4662, filtering unauthorized DS-Replication-Get-Changes requests, correlating with known DCs, and validating findings before response actions.
View Details
Cloud WAF Defense Setup
implementing-cloud-waf-rules
mukul975/Anthropic-Cybersecurity-Skills
223
Guides deploying and tuning AWS, Azure, and Cloudflare WAF rules to block OWASP Top 10 threats, bot and credential stuffing attacks, while logging and analyzing traffic to reduce false positives before enforcement.
View Details
1
Language
简体中文
English