Login
Download
Skill UI
Browse and discover
7044+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
SCA
, found
718
results
Default
Newest
Most Downloaded
Privilege Escalation Detection
detecting-privilege-escalation-attempts
mukul975/Anthropic-Cybersecurity-Skills
450
Detect privilege escalation attempts across Windows and Linux by hunting for token manipulation, UAC bypass, unquoted service paths, kernel exploits, and sudo/doas abuse using EDR/SIEM telemetry and intelligence-driven workflows.
View Details
Kubernetes Privilege Escalation Detection
detecting-privilege-escalation-in-kubernetes-pods
mukul975/Anthropic-Cybersecurity-Skills
106
Monitors Kubernetes pods for privilege escalation by combining admission controls (Pod Security Admission, OPA Gatekeeper) with Falco runtime rules on capabilities, setuid binaries, and namespace usage so SOC analysts can block risky containers and hunt threats.
View Details
Quishing Detection Workflow
detecting-qr-code-phishing-with-email-security
mukul975/Anthropic-Cybersecurity-Skills
226
Provides a workflow for detecting QR-code-based phishing that embeds malicious URLs in email images by enabling image OCR, extracting and scanning QR URLs, sandboxing destinations, and extending protection to mobile users plus awareness training.
View Details
Service Account Abuse Detection
detecting-service-account-abuse
mukul975/Anthropic-Cybersecurity-Skills
303
Structured threat-hunting workflow that detects anomalous service-account logons, lateral movement, and privilege escalation by guiding analysts through hypothesis formation, SIEM/EDR querying, correlation and validation for proactive response.
View Details
CiCd Supply Chain Detection
detecting-supply-chain-attacks-in-ci-cd
mukul975/Anthropic-Cybersecurity-Skills
77
Scans GitHub Actions workflows and CI/CD pipeline files to flag unpinned actions, expressions that may inject scripts, dependency confusion, and exposed secrets while automating audits for analysts hardening build systems.
View Details
Detect Elevation Control Abuse
detecting-t1548-abuse-elevation-control-mechanism
mukul975/Anthropic-Cybersecurity-Skills
102
Surfaces abuse of elevation control mechanisms by correlating registry edits, auto-elevating binaries, integrity changes, and Linux sudo/setuid anomalies to hunt for privilege escalation across Windows and Linux environments.
View Details
AD CS ESC1 Exploit
exploiting-active-directory-certificate-services-esc1
mukul975/Anthropic-Cybersecurity-Skills
355
Exploit misconfigured Active Directory Certificate Services ESC1 templates to request certificates as privileged users, then escalate to Domain Admin during authorized red team or pentest work. Includes enumeration, certificate requests, PKINIT authentication, and follow-on domain access.
View Details
BloodHound AD Exploitation
exploiting-active-directory-with-bloodhound
mukul975/Anthropic-Cybersecurity-Skills
172
Use BloodHound and SharpHound to map Active Directory objects, visualize attack paths, and prioritize privilege escalation chains for authorized red team, penetration testing, or malware analysis work.
View Details
Broken Function Authorization Testing
exploiting-broken-function-level-authorization
mukul975/Anthropic-Cybersecurity-Skills
135
Automates testing APIs for Broken Function Level Authorization by mapping admin endpoints, manipulating HTTP methods, and validating access controls to expose privilege escalation risks.
View Details
Constrained Delegation Exploitation
exploiting-constrained-delegation-abuse
mukul975/Anthropic-Cybersecurity-Skills
438
Exploit Kerberos constrained delegation misconfigurations in Active Directory to impersonate privileged users via S4U2self/S4U2proxy, enabling lateral movement, privilege escalation, and access to CIFS/HTTP/LDAP services during red-team assessments.
View Details
API Excessive Data Exposure
exploiting-excessive-data-exposure-in-api
mukul975/Anthropic-Cybersecurity-Skills
241
Validates APIs that return more fields than their clients need by intercepting responses, comparing them to documentation, and scanning for leaked PII or internal identifiers based on OWASP API3 principles.
View Details
EternalBlue Exploitation Workflow
exploiting-ms17-010-eternalblue-vulnerability
mukul975/Anthropic-Cybersecurity-Skills
358
Guides red teamers through scanning SMB networks, exploiting MS17-010 (EternalBlue), and conducting post-exploitation tasks safely in authorized engagements using tools like Metasploit, Nmap, and AutoBlue.
View Details
Prev
1
2
3
...
40
41
42
43
44
45
46
...
58
59
60
Next
Language
简体中文
English