Login
Download
Skill UI
Browse and discover
6582+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Domain
, found
122
results
Default
Newest
Most Downloaded
AD CS ESC1 Exploit
exploiting-active-directory-certificate-services-esc1
mukul975/Anthropic-Cybersecurity-Skills
355
Exploit misconfigured Active Directory Certificate Services ESC1 templates to request certificates as privileged users, then escalate to Domain Admin during authorized red team or pentest work. Includes enumeration, certificate requests, PKINIT authentication, and follow-on domain access.
View Details
Broken Link Hijacking
exploiting-broken-link-hijacking
mukul975/Anthropic-Cybersecurity-Skills
128
Audit web apps for dead external resources, verify claimable domains/cloud assets, and validate broken-link hijacking paths to demonstrate supply-chain and subdomain takeover risks.
View Details
noPac Domain Admin Exploit
exploiting-nopac-cve-2021-42278-42287
mukul975/Anthropic-Cybersecurity-Skills
377
Exploit the noPac chain (CVE-2021-42278/42287) to elevate a standard Active Directory user to Domain Admin by spoofing machine accounts, abusing Kerberos PAC confusion, and automating the DCSync workflow during authorized red-team engagements.
View Details
Zerologon Domain Takeover
exploiting-zerologon-vulnerability-cve-2020-1472
mukul975/Anthropic-Cybersecurity-Skills
452
Automates the Zerologon (CVE-2020-1472) attack flow against Netlogon, showing scanning, exploitation, DCSync and restoration so red teams or defenders can reproduce the vulnerability, assess exposure, and validate detection logic.
View Details
DCSync Attack Hunting
hunting-for-dcsync-attacks
mukul975/Anthropic-Cybersecurity-Skills
265
Identify unauthorized DCSync credential theft by parsing Event ID 4662 for DS-Replication-Get-Changes requests from non-domain-controller accounts, correlating with SIEM and network context to validate and respond.
View Details
Zeek DNS Tunnel Detection
hunting-for-dns-tunneling-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
353
Analyze Zeek dns.log for long queries, high-entropy subdomains, unusual record types, and query volumes to detect DNS tunneling and covert data exfiltration before it reaches other channels.
View Details
Domain Fronting Detection
hunting-for-domain-fronting-c2-traffic
mukul975/Anthropic-Cybersecurity-Skills
82
Detects domain fronting C2 traffic by comparing TLS SNI and HTTP Host headers from proxy logs, leveraging pyOpenSSL to inspect certificate issuers and SANs, correlating CDN providers and IP ranges, and scoring alerts for high-confidence threat hunting.
View Details
Email Authentication Hardening
implementing-dmarc-dkim-spf-email-security
mukul975/Anthropic-Cybersecurity-Skills
497
Implement SPF, DKIM, and DMARC to stop domain spoofing, verify message integrity, and enforce handling policies; ideal for teams configuring DNS/email servers and monitoring compliance.
View Details
Email Authentication Audit
implementing-email-security-with-dmarc-dkim-spf
mukul975/Anthropic-Cybersecurity-Skills
164
Audits a domain’s email authentication by querying SPF, DKIM, and DMARC DNS records using dnspython, validating syntax/counts, flagging common spoofing risks, and producing remediation guidance.
View Details
Active Directory BloodHound
performing-active-directory-bloodhound-analysis
mukul975/Anthropic-Cybersecurity-Skills
302
Guide for using BloodHound, SharpHound, and AzureHound to collect AD data, import it into BloodHound, and run graph queries that surface attack paths from compromised users to Domain Admins during red team or assessment engagements.
View Details
Active Directory Pen Test
performing-active-directory-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
255
Guide for conducting focused Active Directory penetration tests: enumerate domain objects, analyze attack paths with BloodHound, abuse Kerberos, exploit ADCS/DCSync, and demonstrate privilege escalation to Domain Admin.
View Details
Active Directory Security Audit
performing-active-directory-vulnerability-assessment
mukul975/Anthropic-Cybersecurity-Skills
317
Guides security teams through Active Directory vulnerability assessments with PingCastle health checks, BloodHound attack-path mapping, and Purple Knight scoring to spot misconfigurations, privilege escalation paths, and Kerberos lateral-movement weaknesses in enterprise domains.
View Details
Prev
1
2
3
...
5
6
7
8
9
10
11
Next
Language
简体中文
English