Login
Download
Skill UI
Browse and discover
6034+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Strike
, found
8
results
Default
Newest
Most Downloaded
Sentry Incident Runbook
sentry-incident-runbook
jeremylongshore/claude-code-plugins-plus-skills
287
Guides teams through Sentry-based incident response—from monitoring dashboards and classifying severity to retrieving issue details, applying resolution steps, and producing postmortems when production errors strike.
View Details
Cobalt Strike Beacon Analysis
analyzing-cobalt-strike-beacon-configuration
mukul975/Anthropic-Cybersecurity-Skills
373
Parses Cobalt Strike beacon blobs from PE files or memory dumps to uncover C2 servers, malleable profiles, watermarks, and other indicators, helping incident responders map attacker infrastructure and validate tradecraft.
View Details
Cobalt Strike Profile Analysis
analyzing-cobalt-strike-malleable-profiles
mukul975/Anthropic-Cybersecurity-Skills
476
Parses Cobalt Strike malleable C2 profiles via pyMalleableC2 to pull beacon configs, HTTP communication patterns, sleep/jitter settings, and combines JARM scans for C2 detection when hunting suspected infrastructure or building IDS signatures.
View Details
Cobalt Strike Profile Analysis
analyzing-cobaltstrike-malleable-c2-profiles
mukul975/Anthropic-Cybersecurity-Skills
170
Parse Cobalt Strike Malleable C2 profiles with dissect.cobaltstrike and pyMalleableC2 to extract HTTP indicators, jitter/sleep settings, DNS and injection configs, then craft Suricata/Snort signatures for detection.
View Details
Deploy CrowdStrike EDR
deploying-edr-agent-with-crowdstrike
mukul975/Anthropic-Cybersecurity-Skills
358
Automates deploying and configuring CrowdStrike Falcon EDR agents across Windows, macOS, and Linux endpoints, tuning prevention and response policies, and integrating Falcon telemetry with SIEMs to maintain real-time behavioral and threat detection coverage.
View Details
Ransomware Network Precursors Detection
detecting-ransomware-precursors-in-network
mukul975/Anthropic-Cybersecurity-Skills
447
Identifies early-stage ransomware indicators in Zeek/Suricata/Arkime traffic, correlates with SIEM rules and threat feeds, and alerts on Cobalt Strike beacons, Mimikatz signatures, RDP brute-force and staging behaviors before encryption begins.
View Details
Cobalt Strike Beacon Detection
hunting-for-cobalt-strike-beacons
mukul975/Anthropic-Cybersecurity-Skills
425
Detect Cobalt Strike beacon callbacks by correlating Zeek JA3/JARM data, Suricata IDS alerts, TLS certificate signatures, HTTP malleable profiles, and Python PCAP analysis to score suspicious traffic.
View Details
Zero Trust Posture Assessment
implementing-device-posture-assessment-in-zero-trust
mukul975/Anthropic-Cybersecurity-Skills
86
Implements zero trust device posture assessment by aggregating CrowdStrike ZTA, Intune, and Jamf signals into conditional access policies so Entra ID only grants resources to compliant endpoints while blocking compromised ones.
View Details
1
Language
简体中文
English