Login
Download
Skill UI
Browse and discover
6932+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Domain
, found
123
results
Default
Newest
Most Downloaded
Typosquatting Domain Analysis
analyzing-typosquatting-domains-with-dnstwist
mukul975/Anthropic-Cybersecurity-Skills
158
Use dnstwist to generate and resolve domain permutations, flagging registered typosquatting, homograph, and impersonation sites so SOC teams can hunt, alert, and request take-downs.
View Details
Adversary Infrastructure Tracker
building-adversary-infrastructure-tracking-system
mukul975/Anthropic-Cybersecurity-Skills
264
Automates discovery and monitoring of threat actor C2 infrastructure by ingesting passive DNS, certificate transparency, WHOIS, and IP enrichment data to build a continuously updated graph of related domains, hosts, and registrars for intelligence or incident response teams.
View Details
SAML Azure AD Federation
building-identity-federation-with-saml-azure-ad
mukul975/Anthropic-Cybersecurity-Skills
308
Guides teams through standing up SAML 2.0 federation between on-premises AD/AD FS (or third-party IdP) and Microsoft Entra ID, covering domain conversion, certificates, claims rules, and federated SSO for cloud SaaS apps.
View Details
Domain Persistence via DCSync
conducting-domain-persistence-with-dcsync
mukul975/Anthropic-Cybersecurity-Skills
139
Guides red teamers through DCSync attacks that abuse MS-DRSR to replicate Active Directory hashes, extract KRBTGT/administrative credentials, and forge Golden Tickets for persistence during authorized assessments.
View Details
Full-Scope Red Teaming
conducting-full-scope-red-team-engagement
mukul975/Anthropic-Cybersecurity-Skills
252
Guides planning and executing MITRE ATT&CK-aligned red team engagements from reconnaissance through reporting, emphasizing stealthy payloads, lateral movement, defined objectives like domain dominance and data exfiltration, and the legal/prerequisite controls needed to validate detection and response readiness.
View Details
Active Directory DCSync Detection
detecting-dcsync-attack-in-active-directory
mukul975/Anthropic-Cybersecurity-Skills
353
Hunts for DCSync attacks by monitoring Active Directory replication requests, auditing Event ID 4662, correlating non-domain-controller RPC traffic, and alerting when unauthorized accounts request replication rights to detect credential theft.
View Details
DNS Query Exfiltration Detection
detecting-dns-exfiltration-with-dns-query-analysis
mukul975/Anthropic-Cybersecurity-Skills
349
Builds a passive DNS analysis pipeline that flags DNS tunneling attempts by inspecting query entropy, subdomain length, volume spikes, TXT abuses, and response payload sizes so SOCs can detect exfiltrating data hidden in DNS traffic.
View Details
DNS Exfiltration Detection with Zeek
detecting-exfiltration-over-dns-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
420
Analyzes Zeek dns.log to flag DNS tunneling by computing subdomain entropy, long labels, unique counts and query volumes, scoring domains and emitting structured JSON reports for SOC investigations and monitoring validation.
View Details
Kerberos Golden Ticket Hunt
detecting-golden-ticket-attacks-in-kerberos-logs
mukul975/Anthropic-Cybersecurity-Skills
83
Analyze domain controller Kerberos/TGT logs to detect Golden Ticket anomalies such as RC4 encryption, impossible lifetimes, forged PACs, and missing TGT events, enabling SOCs to hunt post-breach persistence or credential theft across AD environments.
View Details
Shadow IT Cloud Detection
detecting-shadow-it-cloud-usage
mukul975/Anthropic-Cybersecurity-Skills
103
Detect unauthorized SaaS and cloud service usage by analyzing proxy, DNS, and netflow logs with Python pandas to classify domains, measure usage metrics, and flag high-risk services for SOC analysts.
View Details
AD CS ESC1 Exploit
exploiting-active-directory-certificate-services-esc1
mukul975/Anthropic-Cybersecurity-Skills
355
Exploit misconfigured Active Directory Certificate Services ESC1 templates to request certificates as privileged users, then escalate to Domain Admin during authorized red team or pentest work. Includes enumeration, certificate requests, PKINIT authentication, and follow-on domain access.
View Details
Broken Link Hijacking
exploiting-broken-link-hijacking
mukul975/Anthropic-Cybersecurity-Skills
128
Audit web apps for dead external resources, verify claimable domains/cloud assets, and validate broken-link hijacking paths to demonstrate supply-chain and subdomain takeover risks.
View Details
Prev
1
2
3
4
5
6
7
8
9
10
11
Next
Language
简体中文
English