performing-agentless-vulnerability-scanning
mukul975/Anthropic-Cybersecurity-Skills
Configure agentless vulnerability scanning workflows that use SSH, WMI, cloud snapshots, and API discovery to analyze Linux, Windows, and cloud/container systems without installing endpoint agents—ideal for audits, incident response, and compliance checks.