Login
Download
Skill UI
Browse and discover
6006+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
KQL
, found
5
results
Default
Newest
Most Downloaded
Azure Activity Threat Hunting
analyzing-azure-activity-logs-for-threats
mukul975/Anthropic-Cybersecurity-Skills
443
Executes Azure Monitor activity and sign-in log queries using azure-monitor-query to spot suspicious admin operations, impossible travel, privilege escalation, and resource changes, supporting incident investigations and cloud SIEM detections.
View Details
Cloud SIEM With Sentinel
building-cloud-siem-with-sentinel
mukul975/Anthropic-Cybersecurity-Skills
251
Deploy Microsoft Sentinel as a cloud-native SIEM and SOAR platform, configure multi-cloud connectors, author KQL detection rules, and automate incident responses to support centralized SOC threat hunting.
View Details
Azure Lateral Movement Detection
detecting-azure-lateral-movement
mukul975/Anthropic-Cybersecurity-Skills
470
Detect Azure AD/Entra ID lateral movement by correlating Microsoft Graph audit logs, sign-in anomalies, and Sentinel KQL rules to surface credential abuse, token theft, and cross-tenant pivots, then automate responses via playbooks.
View Details
Kerberos Golden Ticket Detection
detecting-golden-ticket-attacks-in-kerberos-logs
mukul975/Anthropic-Cybersecurity-Skills
467
Analyze domain controller Kerberos logs to spot Golden Ticket TGT anomalies such as RC4 encryption, impossible lifetimes, missing TGT requests, and forged PAC signatures, letting SOC teams hunt credential abuse and persistent AD footholds with Splunk or KQL queries.
View Details
Threat Hunting with Elastic
performing-threat-hunting-with-elastic-siem
mukul975/Anthropic-Cybersecurity-Skills
200
Proactively hunt threats in Elastic Security SIEM with KQL/EQL queries, Timeline investigations, and detection rules, helping SOC teams validate ATT&CK techniques, investigate anomalies, and close coverage gaps when automated alerts miss adversaries.
View Details
1
Language
简体中文
English