Login
Download
Skill UI
Browse and discover
6058+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Flow
, found
2167
results
Default
Newest
Most Downloaded
Shadow IT Cloud Detection
detecting-shadow-it-cloud-usage
mukul975/Anthropic-Cybersecurity-Skills
368
Detects unauthorized shadow IT SaaS and cloud usage by parsing proxy, DNS, and netflow logs, classifying domains, measuring traffic volumes, and ranking high-risk services for remediation.
View Details
Supply Chain Attack Detector
detecting-supply-chain-attacks-in-ci-cd
mukul975/Anthropic-Cybersecurity-Skills
368
Audits GitHub Actions workflows and CI/CD pipelines to uncover supply chain risks such as unpinned actions, expression injection, dependency confusion, and overly permissive secrets, supporting hardening efforts and incident response.
View Details
Suspicious PowerShell Detection
detecting-suspicious-powershell-execution
mukul975/Anthropic-Cybersecurity-Skills
347
Hunts suspicious PowerShell executions by spotting encoded commands, macro-triggered download cradles, AMSI bypass attempts, and constrained language evasion across EDR and SIEM telemetry, tying results back to MITRE T1059 in proactive detection or incident-response workflows.
View Details
Sysmon Injection Detection
detecting-t1055-process-injection-with-sysmon
mukul975/Anthropic-Cybersecurity-Skills
294
Detects MITRE T1055 process injection techniques by correlating Sysmon events for remote thread creation, suspicious process access, anomalous DLL loading, and process hollowing to validate detections and feed SIEM alerts in threat-hunting workflows.
View Details
Malware Eradication Workflow
eradicating-malware-from-infected-systems
mukul975/Anthropic-Cybersecurity-Skills
351
Guides responders through systematic removal of malware from compromised hosts, covering persistence mapping, artifact deletion, credential resets, patching, and validation to ensure attackers cannot reestablish footholds during post-containment cleanup.
View Details
Kerberos Constrained Delegation Abuse
exploiting-constrained-delegation-abuse
mukul975/Anthropic-Cybersecurity-Skills
220
Documented methodology for finding Active Directory accounts with constrained delegation and abusing their S4U2self/S4U2proxy flows via Rubeus or Impacket to impersonate privileged users, steal service tickets, and extend lateral movement in red-team engagements.
View Details
Mobile Insecure Data Storage Exploits
exploiting-insecure-data-storage-in-mobile
mukul975/Anthropic-Cybersecurity-Skills
63
Automates mapping and extracting sensitive material from Android/iOS app storage layers, highlighting insecure SharedPreferences, SQLite, backup data, and keychain misuse for OWASP M9-focused mobile penetration testing workflows.
View Details
Mass Assignment REST Exploit
exploiting-mass-assignment-in-rest-apis
mukul975/Anthropic-Cybersecurity-Skills
168
Guide for discovering and exploiting mass assignment flaws in REST APIs, covering workflow from field discovery to automated attacks aimed at privilege escalation, financial tampering, and authorization bypass during API security assessments.
View Details
EternalBlue Exploitation Guide
exploiting-ms17-010-eternalblue-vulnerability
mukul975/Anthropic-Cybersecurity-Skills
336
Detailed red-team workflow for discovering and exploiting the MS17-010 EternalBlue SMBv1 vulnerability, covering scanning, exploit selection, payload configuration, and post-exploitation validation on legacy Windows targets.
View Details
OAuth Misconfiguration Exploit
exploiting-oauth-misconfiguration
mukul975/Anthropic-Cybersecurity-Skills
500
Provides a step-by-step guide to map OAuth/OpenID Connect flows, fuzz redirect URIs, and abuse token/code handling so penetration testers can uncover redirect, leakage, and scope escalation flaws during assessments.
View Details
Prototype Pollution Exploitation
exploiting-prototype-pollution-in-javascript
mukul975/Anthropic-Cybersecurity-Skills
324
Guide to detect and exploit JavaScript prototype pollution on client and server applications, enabling XSS, RCE, and authentication bypass via crafted property injections and workflow steps focusing on Burp Suite, curl payloads, and gadget hunting.
View Details
Race Condition Exploit Flow
exploiting-race-condition-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
220
Detects and exploits race condition vulnerabilities in web apps using Turbo Intruder single-packet attacks, Python threading, and multi-endpoint bursts to bypass rate limits, duplicate transactions, and validate TOCTOU flaws during penetration tests.
View Details
Prev
1
2
3
...
168
169
170
171
172
173
174
...
179
180
181
Next
Language
简体中文
English