Login
Download
Skill UI
Browse and discover
7065+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
R
, found
7061
results
Default
Newest
Most Downloaded
DMARC Enforcement Rollout
performing-dmarc-policy-enforcement-rollout
mukul975/Anthropic-Cybersecurity-Skills
125
Guide to execute a phased DMARC rollout from monitoring (p=none) through quarantine to reject, ensuring every legitimate sender is authenticated before blocking unauthorized mail through SPF/DKIM configuration, report analysis, and ongoing maintenance.
View Details
DNS Enumeration Zone Transfer
performing-dns-enumeration-and-zone-transfer
mukul975/Anthropic-Cybersecurity-Skills
408
Walks through authorized reconnaissance to enumerate DNS records, attempt zone transfers, brute-force subdomains, and map infrastructure so you can identify misconfigurations and exposed assets before targeting services or mail servers.
View Details
DNS Tunneling Detection
performing-dns-tunneling-detection
mukul975/Anthropic-Cybersecurity-Skills
128
Monitors DNS traffic using entropy, query-length, TXT volume, and subdomain cardinality analysis to surface covert channels during incident response or proactive security assessments.
View Details
Docker Bench Security Audit
performing-docker-bench-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
361
Run Docker Bench for Security to automate CIS-aligned audits of host settings, daemon configs, images, runtime, and remediation steps, helping ops teams validate Docker deployments before production and during incident response.
View Details
Dynamic Android Analysis
performing-dynamic-analysis-of-android-app
mukul975/Anthropic-Cybersecurity-Skills
87
Analyzes Android applications at runtime with Frida, Objection, and ADB to hook sensitive methods, observe decrypted data, bypass anti-debug/root checks, and monitor live network traffic during penetration tests or runtime debugging.
View Details
Interactive ANY.RUN Malware Analysis
performing-dynamic-analysis-with-any-run
mukul975/Anthropic-Cybersecurity-Skills
126
Use the ANY.RUN cloud sandbox to perform interactive dynamic malware analysis, interact with prompts, capture process trees, network activity, and export IOCs plus ATT&CK mappings for team reporting.
View Details
Endpoint Forensics Investigation
performing-endpoint-forensics-investigation
mukul975/Anthropic-Cybersecurity-Skills
78
Performs endpoint digital forensics by capturing memory and disk images, analyzing artifacts, and rebuilding timelines to support incident investigations and legal evidence collection.
View Details
Endpoint Vulnerability Remediation
performing-endpoint-vulnerability-remediation
mukul975/Anthropic-Cybersecurity-Skills
301
Automates prioritizing CVEs by risk, orchestrating patch and configuration changes through WSUS/SCCM/Intune, handling zero-day mitigations, and validating fixes to keep endpoints compliant with SLAs.
View Details
SailPoint IIQ Entitlement Review
performing-entitlement-review-with-sailpoint-iiq
mukul975/Anthropic-Cybersecurity-Skills
164
Automates entitlement review, certification campaigns, and remediation workflows with SailPoint IdentityIQ to validate access, target sensitive applications, enforce SoD policies, and provide evidence for periodic compliance campaigns such as SOX or HIPAA.
View Details
External Network Penetration
performing-external-network-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
432
Perform a PTES/OSSTMM-aligned external network penetration test that scans internet-facing assets, validates vulnerabilities via reconnaissance, exploitation, and reporting, and informs remediation before attackers strike.
View Details
SIEM False Positive Reduction
performing-false-positive-reduction-in-siem
mukul975/Anthropic-Cybersecurity-Skills
397
Systematically tune SIEM rules, thresholds, allowlists, correlations, and enrichment so SOC analysts can focus on genuine threats instead of alert fatigue, especially during security assessments and incident response cycles.
View Details
File Carving With Foremost
performing-file-carving-with-foremost
mukul975/Anthropic-Cybersecurity-Skills
319
Use Foremost to carve files from forensic disk images and unallocated space, configuring headers, targeted scans, and optional Scalpel modes to extract documents, media, and evidence when metadata is missing.
View Details
Prev
1
2
3
...
477
478
479
480
481
482
483
...
587
588
589
Next
Language
简体中文
English