Login
Download
Skill UI
Browse and discover
9185+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
MITRE-ATTACK
, found
9
results
Default
Newest
Most Downloaded
Threat Actor ATT&CK Mapping
analyzing-threat-actor-ttps-with-mitre-attack
mukul975/Anthropic-Cybersecurity-Skills
293
Automates mapping threat actor behaviors to MITRE ATT&CK, builds Navigator heatmaps to highlight detection gaps, and generates structured IOC-backed intelligence for SOC analysts and hunters.
View Details
MITRE Navigator TTP Mapping
analyzing-threat-actor-ttps-with-mitre-navigator
mukul975/Anthropic-Cybersecurity-Skills
261
Leverage attackcti to pull ATT&CK STIX/TAXII data, correlate APT group techniques, generate MITRE Navigator layer files, and compare defensive coverage to highlight detection gaps.
View Details
Windows Event Log Analysis
analyzing-windows-event-logs-in-splunk
mukul975/Anthropic-Cybersecurity-Skills
318
Splunk-based Windows event log analysis helps SOC analysts inspect Security, System, and Sysmon data to spot authentication attacks, privilege escalation, persistence, and lateral movement with MITRE-mapped SPL searches.
View Details
Attack Pattern Library Builder
building-attack-pattern-library-from-cti-reports
mukul975/Anthropic-Cybersecurity-Skills
276
Extracts adversary behaviors from CTI reports, maps them to MITRE ATT&CK IDs, and compiles STIX-based attack-pattern records so defenders can query tactics/techniques and generate detection templates.
View Details
Continuous Security Validation
implementing-continuous-security-validation-with-bas
mukul975/Anthropic-Cybersecurity-Skills
320
Automates continuous validation of security controls by emulating real attack techniques with BAS platforms such as SafeBreach, AttackIQ, or Cymulate, aligning results with MITRE ATT&CK and operational readiness.
View Details
MITRE Attack Coverage Mapping
implementing-mitre-attack-coverage-mapping
mukul975/Anthropic-Cybersecurity-Skills
384
Implements MITRE ATT&CK coverage mapping by exporting SIEM detection rules, building coverage matrices, scoring techniques, and surfacing gaps so SOC teams can prioritize rule development and track detection maturity.
View Details
MITRE Threat Modeling
implementing-threat-modeling-with-mitre-attack
mukul975/Anthropic-Cybersecurity-Skills
83
Implements MITRE ATT&CK-based threat modeling to map adversary TTPs, evaluate detection coverage, and prioritize defensive investments for SOCs, new environments, purple team exercises, and risk assessments.
View Details
ATT&CK Coverage Mapping
mapping-mitre-attack-techniques
mukul975/Anthropic-Cybersecurity-Skills
204
Maps observed detection rules, Sigma or SIEM alerts, and intelligence on adversaries to MITRE ATT&CK techniques; builds Navigator heatmaps, labels assets with TIDs, and highlights coverage gaps so SOCs can prioritize controls and report threat exposure.
View Details
Atomic Threat Emulation
performing-threat-emulation-with-atomic-red-team
mukul975/Anthropic-Cybersecurity-Skills
373
Executes MITRE ATT&CK atomic tests via atomic-operator to emulate threats, run attack simulations, and validate SIEM/EDR detection coverage during purple team exercises.
View Details
1
Language
简体中文
English