Login
Download
Skill UI
Browse and discover
6581+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
RSI
, found
332
results
Default
Newest
Most Downloaded
Epic Cinematic Web
epic-design
alirezarezvani/claude-skills
494
Build immersive 2.5D scroll-driven websites with cinematic parallax depth, sticky overlaps, floating products, and choreographed text/clip-path reveals—ideal for premium landing pages and hero showcases.
View Details
Sales Motion Design
sales-motion-design
tech-leads-club/agent-skills
436
Guides founders and GTM leaders through choosing the right sales motion, balancing PLG and sales-led levers, and crafting value-before-purchase experiences to accelerate time-to-first-value and conversion for SaaS or API offerings.
View Details
LaTeX Template Conversion
latex-paper-conversion
sickn33/antigravity-awesome-skills
255
Automates converting academic LaTeX papers between publisher templates by extracting core sections, mapping them into the new template structure, fixing formatting/floats, and compiling while surfacing log errors for debugging.
View Details
Bootkit Rootkit Analysis
analyzing-bootkit-and-rootkit-samples
mukul975/Anthropic-Cybersecurity-Skills
64
Guides acquiring boot sectors, disassembling MBR/VBR, probing UEFI firmware, and hunting kernel rootkit artifacts to investigate persistent bootkits and rootkits that survive OS reinstallation or Secure Boot tampering.
View Details
Linux Artifact Analysis
analyzing-linux-system-artifacts
mukul975/Anthropic-Cybersecurity-Skills
373
Analyze Linux system artifacts such as auth logs, cron jobs, shell histories, and configuration files to identify persistence mechanisms, trace user activity, and detect unauthorized modifications during investigations.
View Details
Analyzing LNK Jump Lists
analyzing-lnk-file-and-jump-list-artifacts
mukul975/Anthropic-Cybersecurity-Skills
464
Guides analysts through interpreting Windows LNK shortcuts and Jump List artifacts using LECmd, JLECmd, and Python parsing to surface file access, program execution, and user activity evidence during forensic investigations.
View Details
Macro Malware Analysis
analyzing-macro-malware-in-office-documents
mukul975/Anthropic-Cybersecurity-Skills
252
Analyzes VBA and XLM macro malware hidden in Office documents to reveal download URLs, execution chains, persistence tactics, and anti-analysis tricks for informed incident response.
View Details
Autoruns Malware Persistence Analysis
analyzing-malware-persistence-with-autoruns
mukul975/Anthropic-Cybersecurity-Skills
159
Use Sysinternals Autoruns to scan Windows ASEPs, flag unsigned binaries, suspicious paths, and LOLBin launch strings, compare results to clean baselines, and validate persistence indicators for malware hunting and response.
View Details
Analyzing Malware Covert Channels
analyzing-network-covert-channels-in-malware
mukul975/Anthropic-Cybersecurity-Skills
97
Guides analysts through detecting malware covert channels such as DNS tunneling, ICMP exfiltration, protocol abuse, and steganographic HTTP by combining Python packet parsing, entropy scoring, and structured SOC workflows.
View Details
Linux Persistence Analysis
analyzing-persistence-mechanisms-in-linux
mukul975/Anthropic-Cybersecurity-Skills
118
Detects and analyzes Linux persistence vectors like crontabs, systemd units, LD_PRELOAD injections, shell profiles, and authorized_keys backdoors while correlating auditd and file integrity data to build a timeline and risk-scored report for SOC triage.
View Details
Windows Event Log Analysis
analyzing-windows-event-logs-in-splunk
mukul975/Anthropic-Cybersecurity-Skills
479
Splunk-based Windows event log analysis helps SOC analysts inspect Security, System, and Sysmon data to spot authentication attacks, privilege escalation, persistence, and lateral movement with MITRE-mapped SPL searches.
View Details
Windows Registry Artifact Analysis
analyzing-windows-registry-for-artifacts
mukul975/Anthropic-Cybersecurity-Skills
150
Guides investigators through extracting Windows registry hives from forensic images and running RegRipper/python-registry to expose installed software, autoruns, persistence keys, and user activity, aiding incident response and threat hunting.
View Details
Prev
1
2
3
...
17
18
19
20
21
22
23
...
26
27
28
Next
Language
简体中文
English