Login
Download
Skill UI
Browse and discover
6278+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Forensic Analysis
, found
22
results
Default
Newest
Most Downloaded
Memory Forensics Toolkit
memory-forensics
sickn33/antigravity-awesome-skills
422
Memory Forensics Toolkit consolidates guidance for acquiring memory dumps, running Volatility analysis, and following incident response workflows to triage malware and forensic cases.
View Details
Judicial Auction Specialist
leiloeiro-ia
sickn33/antigravity-awesome-skills
456
Guides users through judicial and extrajudicial property auctions with integrated legal, forensic, and market analysis, orchestrating five specialized modules to assess risks, valuation, and strategic bidding decisions.
View Details
Antigravity Root Cause Analysis
analyze-project
sickn33/antigravity-awesome-skills
273
Forensic analyzer for Antigravity coding sessions that classifies scope changes, rework patterns, root causes, hotspots, and offers evidence-backed improvement suggestions for prompts and project health.
View Details
Forensic Imaging with dd
acquiring-disk-image-with-dd-and-dcfldd
mukul975/Anthropic-Cybersecurity-Skills
320
Guides investigators through creating forensically sound bit-for-bit disk images with dd or dcfldd, covering write-blocking, hashing, logging, and reporting so evidence stays verifiable before downstream analysis or legal review.
View Details
Bootkit Rootkit Analysis
analyzing-bootkit-and-rootkit-samples
mukul975/Anthropic-Cybersecurity-Skills
231
Walks analysts through acquiring MBR/VBR/UEFI firmware dumps, disassembling boot sectors, auditing firmware modules, and running kernel memory forensics to detect bootkits and rootkits persisting below the OS.
View Details
Autopsy Disk Image Analysis
analyzing-disk-image-with-autopsy
mukul975/Anthropic-Cybersecurity-Skills
290
Guide to using Autopsy for comprehensive disk image forensics—recover files, inspect artifacts, configure ingest modules, run keyword searches, and document evidence for investigations with both GUI and Sleuth Kit CLI commands.
View Details
Email Header Phishing Analysis
analyzing-email-headers-for-phishing-investigation
mukul975/Anthropic-Cybersecurity-Skills
395
Parse and validate email headers when investigating phishing incidents to trace delivery hops, confirm sender authenticity, and detect spoofing via SPF, DKIM, and DMARC checks during forensic response.
View Details
Prefetch Execution Analysis Guide
analyzing-prefetch-files-for-execution-history
mukul975/Anthropic-Cybersecurity-Skills
225
Guide for parsing Windows Prefetch files to reconstruct program execution history, run counts, timestamps, and referenced assets for forensic investigations and incident timelines.
View Details
USB Device History Analysis
analyzing-usb-device-connection-history
mukul975/Anthropic-Cybersecurity-Skills
439
Collects Windows registry hives, SetupAPI logs, and relevant event logs to extract USB storage records, drive-letter assignments, and user mount history for forensic timelines and potential data exfiltration investigations.
View Details
Windows Event Log Analysis
analyzing-windows-event-logs-in-splunk
mukul975/Anthropic-Cybersecurity-Skills
173
Detect Windows authentication attacks, privilege escalation, persistence, and lateral movement by running Splunk SPL queries mapped to MITRE ATT&CK techniques, supporting SOC hunting and forensic investigations.
View Details
Registry Artifact Analysis
analyzing-windows-registry-for-artifacts
mukul975/Anthropic-Cybersecurity-Skills
322
Extract and inspect Windows Registry hives to surface user actions, installed software, autorun entries, and persistence artifacts for incident response and forensic audits using tools like RegRipper and python-registry.
View Details
Windows Shellbag Analysis
analyzing-windows-shellbag-artifacts
mukul975/Anthropic-Cybersecurity-Skills
98
Guide for analyzing Windows Shellbag registry artifacts with SBECmd and ShellBags Explorer to reconstruct folder browsing activity, validate access to removable media/network shares, and support forensic investigations even after data deletion.
View Details
1
2
Next
Language
简体中文
English