Login
Download
Skill UI
Browse and discover
6006+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
dns-tunneling
, found
8
results
Default
Newest
Most Downloaded
DNS Exfiltration Detection
analyzing-dns-logs-for-exfiltration
mukul975/Anthropic-Cybersecurity-Skills
420
Scans DNS query logs within SIEM platforms to flag data exfiltration by spotting suspicious tunneling subdomains, high-entropy DGA-style domains, and abnormal query volumes, helping SOC teams uncover DNS-based threats evading standard controls.
View Details
Malware Covert Channel Detection
analyzing-network-covert-channels-in-malware
mukul975/Anthropic-Cybersecurity-Skills
364
Analyzes malware covert channels such as DNS tunneling, ICMP exfiltration, steganographic HTTP, and protocol abuse via Python/PCAP inspection so incident responders can flag suspicious domains and flows during threat hunting.
View Details
DNS Exfiltration Detection
detecting-dns-exfiltration-with-dns-query-analysis
mukul975/Anthropic-Cybersecurity-Skills
238
Detects DNS tunneling exfiltration by analyzing passive DNS logs for anomalous query entropy, volumes, subdomain length, TXT abuse, and response payloads with statistical and ML techniques to alert on covert data leakage.
View Details
Data Exfiltration Hunt
hunting-for-data-exfiltration-indicators
mukul975/Anthropic-Cybersecurity-Skills
264
Conduct proactive threat hunts for data exfiltration by analyzing network transfers, spotting DNS tunneling, cloud uploads, and encrypted channel abuse to validate suspicious outbound flows in incident response.
View Details
Zeek DNS Tunneling Hunt
hunting-for-dns-tunneling-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
95
Detect DNS tunneling data exfiltration by analyzing Zeek dns.log for high-entropy subdomains, long queries, unusual record types, and elevated volume, correlating with connection metadata and threat intelligence.
View Details
Arkime Traffic Analysis
implementing-network-traffic-analysis-with-arkime
mukul975/Anthropic-Cybersecurity-Skills
157
Deploy Arkime to capture, query, and analyze network sessions, download PCAPs, and flag beaconing, DNS tunneling, or TLS anomalies for proactive threat hunting.
View Details
DNS Tunneling Detection
performing-dns-tunneling-detection
mukul975/Anthropic-Cybersecurity-Skills
51
Leverages entropy metrics, query length checks, TXT volume monitoring, and subdomain cardinality analysis to spot covert DNS channels during threat hunting with Scapy-based traffic inspection.
View Details
TShark Traffic Analysis
performing-network-traffic-analysis-with-tshark
mukul975/Anthropic-Cybersecurity-Skills
61
Automates tshark and pyshark analysis of PCAP files to surface protocol statistics, top talkers, suspicious flows, IOCs, and DNS tunneling insights for incident response.
View Details
1
Language
简体中文
English