Login
Download
Skill UI
Browse and discover
6006+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
Tracking
, found
162
results
Default
Newest
Most Downloaded
Vulnerability SLA Tracker
building-vulnerability-aging-and-sla-tracking
mukul975/Anthropic-Cybersecurity-Skills
394
Build a vulnerability aging dashboard with severity-based SLAs, automated escalations, and compliance KPIs to measure remediation performance in security operations.
View Details
Vulnerability Exception Tracker
building-vulnerability-exception-tracking-system
mukul975/Anthropic-Cybersecurity-Skills
451
Tracks vulnerability exceptions with approval workflows, compensating controls documentation, expiration checks, and notifications so security teams keep risk acceptance visible alongside compliance data and vulnerability management APIs.
View Details
Vulnerability Scanning Workflow
building-vulnerability-scanning-workflow
mukul975/Anthropic-Cybersecurity-Skills
155
Defines a structured vulnerability scanning workflow for SOC teams, covering Nessus/Qualys/OpenVAS scheduling, risk prioritization, and SIEM-ready remediation tracking dashboards.
View Details
Automated Data Scraper Agent
data-scraper-agent
affaan-m/everything-claude-code
357
Build an AI-powered agent that monitors any public source, batches Gemini Flash enrichment, stores outputs in Notion/Sheets/Supabase, and improves via feedback while running for free on GitHub Actions to automate data tracking.
View Details
Living Off The Land Detection
detecting-living-off-the-land-attacks
mukul975/Anthropic-Cybersecurity-Skills
109
Detects abuse of legitimate Windows binaries by tracking process creation, command-line parameters, and parent-child relationships to flag living-off-the-land and fileless attack patterns.
View Details
Sysmon Scheduled Task Detection
detecting-malicious-scheduled-tasks-with-sysmon
mukul975/Anthropic-Cybersecurity-Skills
349
Detects malicious scheduled task creation and modification by correlating Sysmon IDs 1 and 11 with Windows Event 4698/4702, highlighting persistence hunting, suspicious parent processes, public paths, and encoded commands when tracking T1053.005 activity.
View Details
Phishing Simulation Campaign
executing-phishing-simulation-campaign
mukul975/Anthropic-Cybersecurity-Skills
120
Run authorized phishing simulation campaigns to assess employee susceptibility, test email defenses, and measure security awareness through realistic scenarios, credential-tracking infrastructure, and post-exercise reporting.
View Details
Nozomi OT Traffic Analysis
implementing-ot-network-traffic-analysis-with-nozomi
mukul975/Anthropic-Cybersecurity-Skills
75
Deploy Nozomi Networks Guardian sensors for passive OT network monitoring to gain asset visibility, protocol-aware anomaly detection, compliance tracking, and SOC/ServiceNow integration without disrupting industrial control systems.
View Details
SIEM Detection Tuning
implementing-siem-use-case-tuning
mukul975/Anthropic-Cybersecurity-Skills
108
Tune SIEM detection rules to reduce false positives and alert fatigue by analyzing alert volumes, building baselines, creating whitelists, and tracking precision/recall for Splunk and Elastic workflows.
View Details
USB Device Control Policy
implementing-usb-device-control-policy
mukul975/Anthropic-Cybersecurity-Skills
363
Implements USB device control policy across GPO, Intune, or EDR to block unauthorized removable media while allowing approved USB devices, preventing data exfiltration and malware introduction while supporting compliance tracking.
View Details
Vulnerability Remediation SLA Guide
implementing-vulnerability-remediation-sla
mukul975/Anthropic-Cybersecurity-Skills
438
Defines a structured SLA framework for prioritizing vulnerability remediation across severity and asset tiers, integrating ticketing systems, escalations, and KPI tracking so security teams can enforce predictable patching timelines.
View Details
Vulnerability SLA Alerting
implementing-vulnerability-sla-breach-alerting
mukul975/Anthropic-Cybersecurity-Skills
354
Automate vulnerability remediation SLA monitoring by tracking timelines per severity, detecting breaches, triggering escalation workflows via Slack/email/PagerDuty, and generating compliance dashboards to keep security teams accountable.
View Details
Prev
1
2
3
...
10
11
12
13
14
Next
Language
简体中文
English