Login
Download
Skill UI
Browse and discover
6044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Detection
, found
248
results
Default
Newest
Most Downloaded
Azure Activity Threat Hunting
analyzing-azure-activity-logs-for-threats
mukul975/Anthropic-Cybersecurity-Skills
443
Executes Azure Monitor activity and sign-in log queries using azure-monitor-query to spot suspicious admin operations, impossible travel, privilege escalation, and resource changes, supporting incident investigations and cloud SIEM detections.
View Details
Bootkit Rootkit Analysis
analyzing-bootkit-and-rootkit-samples
mukul975/Anthropic-Cybersecurity-Skills
85
Analyzes bootkits and rootkits that hijack the MBR/VBR or UEFI to persist below the OS, guiding firmware acquisition, signature comparison, and detection when AV/EDR miss pre-boot implants.
View Details
Cobalt Strike Profile Analysis
analyzing-cobalt-strike-malleable-profiles
mukul975/Anthropic-Cybersecurity-Skills
476
Parses Cobalt Strike malleable C2 profiles via pyMalleableC2 to pull beacon configs, HTTP communication patterns, sleep/jitter settings, and combines JARM scans for C2 detection when hunting suspected infrastructure or building IDS signatures.
View Details
Cobalt Strike Profile Analysis
analyzing-cobaltstrike-malleable-c2-profiles
mukul975/Anthropic-Cybersecurity-Skills
170
Parse Cobalt Strike Malleable C2 profiles with dissect.cobaltstrike and pyMalleableC2 to extract HTTP indicators, jitter/sleep settings, DNS and injection configs, then craft Suricata/Snort signatures for detection.
View Details
Command-and-Control Analysis
analyzing-command-and-control-communication
mukul975/Anthropic-Cybersecurity-Skills
399
Analyzes malware command-and-control (C2) communication by profiling protocols, beaconing behavior, and payload structure to inform detection, reverse engineering, and threat intelligence workflows.
View Details
Cyber Kill Chain Analysis
analyzing-cyber-kill-chain
mukul975/Anthropic-Cybersecurity-Skills
90
Analyzes intrusion activity against the Lockheed Martin Cyber Kill Chain to map completed phases, detection outcomes, and defensive courses of action for incident response, threat reporting, and control planning.
View Details
DNS Exfiltration Detection
analyzing-dns-logs-for-exfiltration
mukul975/Anthropic-Cybersecurity-Skills
420
Scans DNS query logs within SIEM platforms to flag data exfiltration by spotting suspicious tunneling subdomains, high-entropy DGA-style domains, and abnormal query volumes, helping SOC teams uncover DNS-based threats evading standard controls.
View Details
Phishing Email Header Forensics
analyzing-email-headers-for-phishing-investigation
mukul975/Anthropic-Cybersecurity-Skills
269
Parse and analyze email headers to trace phishing origins, validate SPF/DKIM/DMARC, inspect relay hops, and support incident response when suspicious messages evade detection.
View Details
Linux Audit Intrusion Detection
analyzing-linux-audit-logs-for-intrusion
mukul975/Anthropic-Cybersecurity-Skills
131
Parse Linux auditd logs for unauthorized file access, privilege escalation, syscall anomalies, and suspicious processes using ausearch plus Python automation.
View Details
Linux Kernel Rootkit Detection
analyzing-linux-kernel-rootkits
mukul975/Anthropic-Cybersecurity-Skills
127
Detect kernel-level rootkits in Linux memory dumps by combining Volatility3 linux plugins (check_syscall, lsmod, hidden_modules, check_idt), cross-view /proc versus /sys analysis, and live scans with rkhunter/chkrootkit to report hooked syscalls and hidden modules.
View Details
Malicious PDF Analysis
analyzing-malicious-pdf-with-peepdf
mukul975/Anthropic-Cybersecurity-Skills
342
Guide for static analysis of malicious PDFs using peepdf, pdfid, and pdf-parser to triage phishing attachments, unpack embedded JavaScript/shellcode, and collect indicators for detection.
View Details
Malware Sandbox Evasion Detection
analyzing-malware-sandbox-evasion-techniques
mukul975/Anthropic-Cybersecurity-Skills
493
Analyze Cuckoo Sandbox and AnyRun behavioral JSON reports to detect timing checks, VM artifacts, user interaction probes, and sleep inflation that signal malware trying to evade sandbox analysis, then map findings to MITRE ATT&CK T1497.
View Details
Prev
1
2
3
...
5
6
7
8
9
10
11
...
19
20
21
Next
Language
简体中文
English