detecting-evasion-techniques-in-endpoint-logs
mukul975/Anthropic-Cybersecurity-Skills
Guides security analysts through endpoint log use cases for detecting defense evasion tactics such as log tampering, timestomping, process injection, masquerading, LOLBin abuse, and security tool disabling to support hunting, rule development, and investigation aligned with MITRE ATT&CK TA0005.