Login
Download
Skill UI
Browse and discover
6186+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
incident-response-incident-response
, found
125
results
Default
Newest
Most Downloaded
Webshell Hunting Workflow
hunting-for-webshell-activity
mukul975/Anthropic-Cybersecurity-Skills
174
Hunt for web shell deployments on internet-facing servers by analyzing file writes, spawned processes, and HTTP anomalies; use this guide during proactive threat-hunting, incident response, and SIEM/EDR detection tuning.
View Details
Implementing OT Incident Response
implementing-ot-incident-response-playbook
mukul975/Anthropic-Cybersecurity-Skills
100
Creates OT-specific incident response playbooks aligned with SANS PICERL, IEC 62443, and NIST SP 800-82 to coordinate IT SOC, OT engineers, and plant ops during ICS ransomware or safety incidents.
View Details
SOAR Automation with Phantom
implementing-soar-automation-with-phantom
mukul975/Anthropic-Cybersecurity-Skills
88
Automates SOC workflows with Splunk SOAR Phantom to triage alerts, enrich IOCs, orchestrate containment, and standardize analyst playbooks for faster incident response.
View Details
XSOAR SOAR Playbook Automation
implementing-soar-playbook-with-palo-alto-xsoar
mukul975/Anthropic-Cybersecurity-Skills
182
Automates incident response through Cortex XSOAR playbooks, chaining enrichment, decision logic, containment, and ticketing so SOC teams reduce MTTR while orchestrating multiple security tools.
View Details
Velociraptor IR Collection
implementing-velociraptor-for-ir-collection
mukul975/Anthropic-Cybersecurity-Skills
89
Deploy and configure Velociraptor across Windows, Linux, and macOS to automate forensic artifact collection, use VQL hunts, and scale incident response operations with centralized servers and Fleetspeak-managed clients.
View Details
Active Directory BloodHound Analysis
performing-active-directory-bloodhound-analysis
mukul975/Anthropic-Cybersecurity-Skills
59
Use BloodHound with SharpHound or AzureHound to enumerate Active Directory relationships, surface attack paths, and visualize privilege escalation from compromised users to Domain Admin; ideal for red-team assessments, incident response, and control validation.
View Details
Active Directory Pen Test
performing-active-directory-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
118
Guide to conducting focused Active Directory penetration tests: enumerate domain objects, map attack paths with BloodHound, exploit Kerberos, abuse ADCS/DCSync, and demonstrate privilege escalation to domain compromise for security assessments and incident response.
View Details
Active Directory Vulnerability Assessment
performing-active-directory-vulnerability-assessment
mukul975/Anthropic-Cybersecurity-Skills
111
Use PingCastle, BloodHound, and Purple Knight to map AD misconfigurations, privilege escalation paths, and risky assets, supporting audit or incident response teams with reporting-ready findings.
View Details
Authenticated Vulnerability Scanning
performing-authenticated-vulnerability-scan
mukul975/Anthropic-Cybersecurity-Skills
468
Uses credentialed access to log into hosts, inspect software, patch levels, configs, and policies with scanners like Nessus and Qualys, reducing false positives while revealing deep-rooted vulnerabilities for audits or incident response.
View Details
Automated Malware Analysis
performing-automated-malware-analysis-with-cape
mukul975/Anthropic-Cybersecurity-Skills
214
Deploys CAPEv2 sandbox to automatically run malware samples, monitor behavior, dump payloads, parse configurations, and extract IOCs for incident response or proactive security testing.
View Details
ScoutSuite AWS Enumeration
performing-aws-account-enumeration-with-scout-suite
mukul975/Anthropic-Cybersecurity-Skills
114
ScoutSuite performs agentless AWS account enumeration by querying APIs, collecting configuration data, flagging misconfigurations, and producing interactive HTML reports to support audits or incident response efforts.
View Details
Bluetooth Security Assessment
performing-bluetooth-security-assessment
mukul975/Anthropic-Cybersecurity-Skills
228
Performs Bluetooth Low Energy security assessments using Python bleak to discover devices, enumerate GATT services, flag unauthenticated characteristics, compare UUIDs against known vulnerabilities, and produce structured JSON reports for incident response or compliance audits.
View Details
Prev
1
2
3
...
5
6
7
8
9
10
11
Next
Language
简体中文
English