Login
Download
Skill UI
Browse and discover
6581+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Paths
, found
64
results
Default
Newest
Most Downloaded
Splunk Lateral Movement Detection
detecting-lateral-movement-with-splunk
mukul975/Anthropic-Cybersecurity-Skills
209
Guide to hunting lateral movement using Splunk SPL against Windows auth, SMB, and remote service abuse logs to trace credential theft, anomalous access, and threat paths for incident response.
View Details
Sysmon Scheduled Task Detection
detecting-malicious-scheduled-tasks-with-sysmon
mukul975/Anthropic-Cybersecurity-Skills
249
Detect malicious scheduled task creation and modification using Sysmon (Event IDs 1/11), Windows Security events (4698/4702), and correlation of suspicious parents, public paths, and encoded arguments for persistence and lateral movement analysis.
View Details
Privilege Escalation Detection
detecting-privilege-escalation-attempts
mukul975/Anthropic-Cybersecurity-Skills
450
Detect privilege escalation attempts across Windows and Linux by hunting for token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse using EDR/SIEM telemetry and intelligence-driven workflows.
View Details
Active Directory Attack Simulation
executing-active-directory-attack-simulation
mukul975/Anthropic-Cybersecurity-Skills
58
Performs authorized Active Directory penetration testing by simulating privileged attack paths, Kerberos abuses, and credential extraction to expose misconfigurations and verify detections before a real compromise occurs.
View Details
BloodHound AD Exploitation
exploiting-active-directory-with-bloodhound
mukul975/Anthropic-Cybersecurity-Skills
172
Use BloodHound and SharpHound to map Active Directory objects, visualize attack paths, and prioritize privilege escalation chains for authorized red team, penetration testing, or malware analysis work.
View Details
Broken Link Hijacking
exploiting-broken-link-hijacking
mukul975/Anthropic-Cybersecurity-Skills
128
Audit web apps for dead external resources, verify claimable domains/cloud assets, and validate broken-link hijacking paths to demonstrate supply-chain and subdomain takeover risks.
View Details
Hunt LOLBins Execution
hunting-for-lolbins-execution-in-endpoint-logs
mukul975/Anthropic-Cybersecurity-Skills
83
Analyzes endpoint process logs to detect legitimate Windows binaries abused by adversaries, ranking suspicious command lines, parent processes, execution paths, and network cues for prioritized triage.
View Details
Detect Unusual Windows Services
hunting-for-unusual-service-installations
mukul975/Anthropic-Cybersecurity-Skills
183
Hunt malicious Windows services by parsing System.evtx Event ID 7045 records, analyzing binary paths (temp folders, PowerShell/cmd patterns), flagging risky indicators, and mapping findings to MITRE ATT&CK T1543.003 for SOC reporting.
View Details
XM Cyber Attack Path Analysis
implementing-attack-path-analysis-with-xm-cyber
mukul975/Anthropic-Cybersecurity-Skills
362
Deploy XM Cyber's continuous exposure management platform to map attack paths, identify choke points, and prioritize critical exposures for remediation across on-premises and cloud environments.
View Details
RPKI BGP Security Setup
implementing-bgp-security-with-rpki
mukul975/Anthropic-Cybersecurity-Skills
64
Guides network engineers through creating ROAs via RIR portals, deploying an RPKI validator like Routinator, and configuring Cisco IOS-XE and Juniper Junos routers to enforce ROV policies that block hijacks and prefer validated paths.
View Details
Active Directory BloodHound
performing-active-directory-bloodhound-analysis
mukul975/Anthropic-Cybersecurity-Skills
302
Guide for using BloodHound, SharpHound, and AzureHound to collect AD data, import it into BloodHound, and run graph queries that surface attack paths from compromised users to Domain Admins during red team or assessment engagements.
View Details
Active Directory Pen Test
performing-active-directory-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
255
Guide for conducting focused Active Directory penetration tests: enumerate domain objects, analyze attack paths with BloodHound, abuse Kerberos, exploit ADCS/DCSync, and demonstrate privilege escalation to Domain Admin.
View Details
Prev
1
2
3
4
5
6
Next
Language
简体中文
English