Login
Download
Skill UI
Browse and discover
6191+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Graph IO
, found
171
results
Default
Newest
Most Downloaded
Zero Trust mTLS Setup
implementing-mtls-for-zero-trust-services
mukul975/Anthropic-Cybersecurity-Skills
371
Configures Python-based mutual TLS authentication between microservices using the cryptography and ssl modules, validates certificate chains and expiry, and audits deployment readiness to enforce zero-trust service-to-service controls.
View Details
Azure Privileged Identity Management
implementing-privileged-identity-management-with-azure
mukul975/Anthropic-Cybersecurity-Skills
273
Configure Azure AD Privileged Identity Management via Microsoft Graph API to enumerate eligible and active assignments, request just-in-time activations, audit logs, and enforce MFA or approval policies for zero-trust privileged access scenarios.
View Details
Phishing Incident Investigation
investigating-phishing-email-incident
mukul975/Anthropic-Cybersecurity-Skills
448
Investigates reported phishing emails end-to-end by analyzing headers, detonating URLs and attachments, identifying impacted users via SIEM/Graph searches, and executing containment actions with SOC tooling.
View Details
MobSF Android Static Analysis
performing-android-app-static-analysis-with-mobsf
mukul975/Anthropic-Cybersecurity-Skills
394
Automates MobSF-powered Android static app scans to flag hardcoded secrets, insecure permissions, and weak cryptography before deployment or during pen tests and CI/CD security gates.
View Details
AWS Privilege Escalation Audit
performing-aws-privilege-escalation-assessment
mukul975/Anthropic-Cybersecurity-Skills
149
Guides authorized testers through enumerating IAM policies, scanning known escalation techniques with Pacu, mapping trust graphs with PMapper, and validating cross-account roles to spot privilege escalation routes in AWS.
View Details
Cartography Cloud Asset Inventory
performing-cloud-asset-inventory-with-cartography
mukul975/Anthropic-Cybersecurity-Skills
342
Use Cartography to ingest AWS, GCP, and Azure resources into Neo4j, mapping IAM permissions, network relationships, and attack paths so security teams can audit infrastructures and spot high-risk exposures.
View Details
Cryptographic Audit Tool
performing-cryptographic-audit-of-application
mukul975/Anthropic-Cybersecurity-Skills
100
Provides an automated cryptographic audit tool that scans Python and configuration files to flag deprecated algorithms, insecure modes, hardcoded secrets, TLS weaknesses, and other crypto vulnerabilities before deployment.
View Details
GraphQL Introspection Attack
performing-graphql-introspection-attack
mukul975/Anthropic-Cybersecurity-Skills
93
Executes GraphQL introspection attacks to harvest full API schemas, identify sensitive operations, and probe for query depth, batching, and nested DoS weaknesses during authorized security testing.
View Details
GraphQL Security Testing
performing-graphql-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
179
Guides penetration testers through discovering GraphQL endpoints, extracting schemas, verifying authorization, and probing injection risks during authorized assessments of web, mobile, or microservice GraphQL APIs.
View Details
Steganography Detection Workflow
performing-steganography-detection
mukul975/Anthropic-Cybersecurity-Skills
195
Detect hidden payloads in images, audio, and video by combining metadata inspection, binwalk/zsteg/stegoveritas scans, steghide extraction attempts, and custom LSB analysis scripts to trace covert communication channels during digital forensics investigations.
View Details
Ransomware Encryption Analysis
reverse-engineering-ransomware-encryption-routine
mukul975/Anthropic-Cybersecurity-Skills
196
Reverse engineer ransomware encryption routines via static and dynamic analysis to uncover cryptographic algorithms, key generation flaws, and implementation mistakes that could yield decryption paths or inform defensive detection.
View Details
BOLA API Testing Guide
testing-api-for-broken-object-level-authorization
mukul975/Anthropic-Cybersecurity-Skills
70
Guides pentesters through detecting Broken Object Level Authorization in REST and GraphQL APIs by enumerating object IDs, intercepting requests, manipulating identifiers, and verifying per-object access controls during OWASP API1 assessments.
View Details
Prev
1
2
3
...
10
11
12
13
14
15
Next
Language
简体中文
English