detecting-evasion-techniques-in-endpoint-logs
mukul975/Anthropic-Cybersecurity-Skills
Detects adversary defense-evasion techniques in endpoint logs, covering log tampering, timestomping, process injection, and security tool disabling; useful for threat hunting, detection engineering, and incident response on Windows/EDR telemetry.