hunting-for-living-off-the-cloud-techniques
mukul975/Anthropic-Cybersecurity-Skills
Hunts for adversary abuse of legitimate cloud services by layering telemetry from EDR, SIEM, and threat intelligence to detect C2, staging, or exfiltration activity across Azure, AWS, GCP, and SaaS platforms.