Login
Download
Skill UI
Browse and discover
6034+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
DNS
, found
38
results
Default
Newest
Most Downloaded
Sliver C2 Infrastructure
building-c2-infrastructure-with-sliver-framework
mukul975/Anthropic-Cybersecurity-Skills
195
Guide to deploying and hardening a resilient Sliver command-and-control infrastructure, covering team server provisioning, HTTPS/mTLS/DNS/WireGuard listeners, redirectors, implant generation, and post-exploitation operations for authorized red-team engagements.
View Details
OSINT External Reconnaissance
conducting-external-reconnaissance-with-osint
mukul975/Anthropic-Cybersecurity-Skills
265
Uses OSINT techniques to map an organization’s external attack surface without hitting any systems directly; aggregates DNS, certificate, breach, social media, and cloud data for passive reconnaissance before penetration tests or red team engagements.
View Details
MitM Attack Simulation
conducting-man-in-the-middle-attack-simulation
mukul975/Anthropic-Cybersecurity-Skills
91
Simulates MITM scenarios with Bettercap, Ettercap, and mitmproxy in authorized lab settings to validate TLS enforcement, DNS/ARP spoofing detection, credential interception, and defender response workflows through controlled traffic manipulation.
View Details
DNS Exfiltration Detection
detecting-dns-exfiltration-with-dns-query-analysis
mukul975/Anthropic-Cybersecurity-Skills
238
Detects DNS tunneling exfiltration by analyzing passive DNS logs for anomalous query entropy, volumes, subdomain length, TXT abuse, and response payloads with statistical and ML techniques to alert on covert data leakage.
View Details
Zeek DNS Exfiltration Detection
detecting-exfiltration-over-dns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
387
Analyzes Zeek dns.log data to spot DNS-based exfiltration by measuring entropy, label length, subdomain volume, and query rates, then scores and reports suspicious domains for incident response.
View Details
Zeek Network Anomaly Detection
detecting-network-anomalies-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
108
Deploys Zeek to passively monitor network traffic, emit structured connection/DNS/HTTP/SSL logs, and run custom scripts that flag anomalous behavior for threat hunting and incident response teams.
View Details
Shadow IT Cloud Detection
detecting-shadow-it-cloud-usage
mukul975/Anthropic-Cybersecurity-Skills
368
Detects unauthorized shadow IT SaaS and cloud usage by parsing proxy, DNS, and netflow logs, classifying domains, measuring traffic volumes, and ranking high-risk services for remediation.
View Details
Data Exfiltration Hunt
hunting-for-data-exfiltration-indicators
mukul975/Anthropic-Cybersecurity-Skills
264
Conduct proactive threat hunts for data exfiltration by analyzing network transfers, spotting DNS tunneling, cloud uploads, and encrypted channel abuse to validate suspicious outbound flows in incident response.
View Details
DNS Persistence Hunting
hunting-for-dns-based-persistence
mukul975/Anthropic-Cybersecurity-Skills
209
Hunt DNS persistence by exporting zone baselines, querying SecurityTrails passive history, and auditing provider logs to spot hijacks, dangling records, and unauthorized delegations.
View Details
Zeek DNS Tunneling Hunt
hunting-for-dns-tunneling-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
95
Detect DNS tunneling data exfiltration by analyzing Zeek dns.log for high-entropy subdomains, long queries, unusual record types, and elevated volume, correlating with connection metadata and threat intelligence.
View Details
Canarytoken Deception Detection
implementing-deception-based-detection-with-canarytoken
mukul975/Anthropic-Cybersecurity-Skills
172
Automates Canary Tokens creation and monitoring via the Thinkst Canary API to deploy web, DNS, document, and AWS key tripwires, track alerts, and produce deception coverage reports for breach detection.
View Details
Email Authentication Audit
implementing-email-security-with-dmarc-dkim-spf
mukul975/Anthropic-Cybersecurity-Skills
164
Audits a domain’s email authentication by querying SPF, DKIM, and DMARC DNS records using dnspython, validating syntax/counts, flagging common spoofing risks, and producing remediation guidance.
View Details
Prev
1
2
3
4
Next
Language
简体中文
English