Login
Download
Skill UI
Browse and discover
6004+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Inspection
, found
42
results
Default
Newest
Most Downloaded
Malware Covert Channel Detection
analyzing-network-covert-channels-in-malware
mukul975/Anthropic-Cybersecurity-Skills
364
Analyzes malware covert channels such as DNS tunneling, ICMP exfiltration, steganographic HTTP, and protocol abuse via Python/PCAP inspection so incident responders can flag suspicious domains and flows during threat hunting.
View Details
Wireshark Network Inspection
analyzing-network-traffic-with-wireshark
mukul975/Anthropic-Cybersecurity-Skills
193
Guide for capturing and dissecting packet streams with Wireshark/tshark to spot malicious traffic, troubleshoot protocol issues, and surface artifacts for incident response on authorized network segments.
View Details
UPX Malware Unpacker
analyzing-packed-malware-with-upx-unpacker
mukul975/Anthropic-Cybersecurity-Skills
486
Detects packed samples, repairs tampered UPX headers, and applies automated or manual debugger unpacking so analysts can recover original executables for static inspection.
View Details
Phishing Email Header Analysis
analyzing-phishing-email-headers
mukul975/Anthropic-Cybersecurity-Skills
346
Analyze email headers to uncover sender origins, routing chains, and authentication results, enabling defenders to validate legitimacy and spot phishing indicators using manual inspection and automation scripts.
View Details
Mobile App Pentesting
conducting-mobile-app-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
50
Runs OWASP MASTG-based penetration tests on iOS and Android apps, combining static binary analysis, runtime inspection, network interception, and API/data storage reviews to reveal vulnerabilities before release.
View Details
ARP Poisoning Detection
detecting-arp-poisoning-in-network-traffic
mukul975/Anthropic-Cybersecurity-Skills
285
Use ARPWatch, Dynamic ARP Inspection, Wireshark filters, and Python monitoring scripts to detect and block ARP spoofing in sensitive LAN segments, preventing man-in-the-middle interception.
View Details
Detect DNP3 Anomalies
detecting-dnp3-protocol-anomalies
mukul975/Anthropic-Cybersecurity-Skills
208
Detect anomalies in SCADA DNP3 traffic by monitoring for unauthorized control commands, protocol violations, firmware update attempts, and unusual baselines through deep packet inspection and ML-enabled heuristics.
View Details
Modbus Injection Detection
detecting-modbus-command-injection-attacks
mukul975/Anthropic-Cybersecurity-Skills
353
Detects Modbus command injection attacks in ICS by monitoring Modbus TCP/RTU traffic for unauthorized writes, anomalous function codes, and baseline deviations using IDS/protocol inspection so SOC analysts can flag FrostyGoop-style manipulations before they impact PLC operations.
View Details
Apigee API Threat Protection
implementing-api-threat-protection-with-apigee
mukul975/Anthropic-Cybersecurity-Skills
326
Implement Apigee security policies to shield APIs from OWASP Top 10 threats by combining JSON/XML threat filtering, regex inspection, SpikeArrest rate limiting, OAuth 2.0 checks, API key validation, and Advanced API Security.
View Details
Tofino ICS Firewall Deployment
implementing-ics-firewall-with-tofino
mukul975/Anthropic-Cybersecurity-Skills
254
Guides security teams to deploy Belden/Hirschmann Tofino industrial firewalls, design zone-level protection for PLCs and RTUs, and craft deep packet inspection rules tailored to Modbus, EtherNet/IP, OPC, and S7comm traffic for OT environments.
View Details
Supply Chain Security with In-Toto
implementing-supply-chain-security-with-in-toto
mukul975/Anthropic-Cybersecurity-Skills
226
Defines how to enforce container build supply chain integrity with in-toto by crafting layouts, key-based attestations, and inspection rules so CI/CD pipelines publish verifiable metadata before deployments.
View Details
DNS Tunneling Detection
performing-dns-tunneling-detection
mukul975/Anthropic-Cybersecurity-Skills
51
Leverages entropy metrics, query length checks, TXT volume monitoring, and subdomain cardinality analysis to spot covert DNS channels during threat hunting with Scapy-based traffic inspection.
View Details
Prev
1
2
3
4
Next
Language
简体中文
English