Login
Download
Skill UI
Browse and discover
7044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
OST
, found
630
results
Default
Newest
Most Downloaded
Internal Network Pen Test
conducting-internal-network-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
93
Conduct a simulated insider or post-breach internal network penetration test covering discovery, enumeration, credential harvesting, and lateral movement to assess privilege escalation paths and data exposure.
View Details
Post-Incident Lessons Review
conducting-post-incident-lessons-learned
mukul975/Anthropic-Cybersecurity-Skills
436
Structured facilitation of post-incident reviews that captures timelines, successes, failures, root causes, response metrics, and actionable improvements to strengthen future incident response.
View Details
Spearphishing Simulation Campaign
conducting-spearphishing-simulation-campaign
mukul975/Anthropic-Cybersecurity-Skills
148
Guides red teams through OSINT-driven spearphishing simulation campaigns, covering pretext development, payload crafting, email infrastructure setup, execution, and post-campaign analysis for authorized assessments.
View Details
Host-Based Intrusion Configuration
configuring-host-based-intrusion-detection
mukul975/Anthropic-Cybersecurity-Skills
59
Guides configuring host-based intrusion detection (HIDS) with Wazuh/OSSEC/AIDE, covering agent installs, file integrity monitoring, rootkit checks, log rules, and active responses so endpoints stay compliant and feed SIEMs.
View Details
Deploy Zscaler Private Access
configuring-zscaler-private-access-for-ztna
mukul975/Anthropic-Cybersecurity-Skills
380
Guides deploying Zscaler Private Access to replace VPNs with zero-trust access, covering App Connector installs, internal app segmentation, identity- and posture-based access policies, and device posture enforcement for secure remote access.
View Details
Cloudflare Access Zero Trust
deploying-cloudflare-access-for-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
363
Step-by-step instructions for using Cloudflare Tunnel and Access policies to expose self-hosted services, configure identity providers, posture checks, and WARP enrollment so teams can replace VPNs with secure zero-trust access.
View Details
Detecting Business Email Compromise
detecting-business-email-compromise
mukul975/Anthropic-Cybersecurity-Skills
310
Guides SOC teams to detect business email compromise by combining email gateway rules, behavioral analytics, and finance controls to uncover social engineering and impostor scenarios before funds or data are lost.
View Details
Cloud Cryptomining Detection
detecting-cryptomining-in-cloud
mukul975/Anthropic-Cybersecurity-Skills
329
Guides security teams through multi-signal detection of unauthorized cryptocurrency mining in cloud workloads, combining cost, compute, network, GuardDuty, and runtime monitoring with alerting and remediation.
View Details
DLL Sideloading Detection Guide
detecting-dll-sideloading-attacks
mukul975/Anthropic-Cybersecurity-Skills
197
Guidance for detecting DLL side-loading attacks by monitoring DLL loads, validating signatures/hashes, and correlating host behavior to flag hijacked execution flows in enterprise environments.
View Details
Kerberos Golden Ticket Hunt
detecting-golden-ticket-attacks-in-kerberos-logs
mukul975/Anthropic-Cybersecurity-Skills
83
Analyze domain controller Kerberos/TGT logs to detect Golden Ticket anomalies such as RC4 encryption, impossible lifetimes, forged PACs, and missing TGT events, enabling SOCs to hunt post-breach persistence or credential theft across AD environments.
View Details
IPv6 Vulnerability Testing
exploiting-ipv6-vulnerabilities
mukul975/Anthropic-Cybersecurity-Skills
479
Guides security teams through authorized IPv6 assessments by enumerating hosts, spoofing router advertisements, performing SLAAC-based MITM, and probing tunnels to verify dual-stack controls and IPv6-aware IDS/firewalls.
View Details
EternalBlue Exploitation Workflow
exploiting-ms17-010-eternalblue-vulnerability
mukul975/Anthropic-Cybersecurity-Skills
358
Guides red teamers through scanning SMB networks, exploiting MS17-010 (EternalBlue), and conducting post-exploitation tasks safely in authorized engagements using tools like Metasploit, Nmap, and AutoBlue.
View Details
Prev
1
2
3
...
38
39
40
41
42
43
44
...
51
52
53
Next
Language
简体中文
English