Login
Download
Skill UI
Browse and discover
6369+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Security Operations
, found
17
results
Default
Newest
Most Downloaded
Honeytokens Breach Detection
implementing-honeytokens-for-breach-detection
mukul975/Anthropic-Cybersecurity-Skills
294
Implements deception-based breach detection by deploying Canarytokens API-backed honeytokens (fake AWS keys, DNS canaries, document beacons, DB records) and webhook alerts to surface unauthorized access during security operations or compliance exercises.
View Details
Blockchain Log Integrity
implementing-log-integrity-with-blockchain
mukul975/Anthropic-Cybersecurity-Skills
407
Build an append-only log integrity chain by chaining SHA-256 hashes of each entry with the previous hash, enabling tamper detection and verification, with optional checkpoint anchoring to timestamp services for security operations use cases.
View Details
BloodHound AD Analysis
performing-active-directory-bloodhound-analysis
mukul975/Anthropic-Cybersecurity-Skills
389
Use BloodHound together with SharpHound/AzureHound to enumerate Active Directory relationships, visualize attack paths, and validate privilege escalation risks during red team or security assessment operations.
View Details
Active Directory Honeytokens
deploying-active-directory-honeytokens
mukul975/Anthropic-Cybersecurity-Skills
439
Deploys deception-based honeytokens in Active Directory to add fake privileged accounts, SPNs, GPOs, and BloodHound paths so monitoring Event IDs flags credential theft, Kerberoasting, and lateral movement during AD security operations.
View Details
GitHub Operations Automation
github-ops
affaan-m/everything-claude-code
484
Coordinate GitHub repository operations via the gh CLI for issue triage, PR oversight, CI/CD debugging, release preparation, and monitoring dependencies or security alerts.
View Details
Prev
1
2
Language
简体中文
English