Login
Download
Skill UI
Browse and discover
6152+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
red-team
, found
206
results
Default
Newest
Most Downloaded
Adversary Infrastructure Tracker
building-adversary-infrastructure-tracking-system
mukul975/Anthropic-Cybersecurity-Skills
385
Automates tracking of adversary infrastructure using passive DNS, certificate transparency, WHOIS and IP enrichment to map C2 networks and detect newly registered domains matching malicious patterns; supports security teams monitoring threat actor pivoting and compliance.
View Details
Sliver C2 Infrastructure Build
building-c2-infrastructure-with-sliver-framework
mukul975/Anthropic-Cybersecurity-Skills
75
Guide to deploying a resilient Sliver C2 stack with hardened team servers, redirectors, HTTPS/mTLS/DNS/WireGuard listeners, and multi-operator workflows for authorized red-team campaigns and secure post-exploitation.
View Details
Malware Incident Communication
building-malware-incident-communication-template
mukul975/Anthropic-Cybersecurity-Skills
187
Provides structured templates and escalation guidance for communicating malware incidents to stakeholders, executives, IT teams, and regulators, ensuring clarity across severity levels and channels.
View Details
Patch Tuesday Response Process
building-patch-tuesday-response-process
mukul975/Anthropic-Cybersecurity-Skills
135
Defines a structured workflow for reviewing Microsoft advisories, triaging high-risk CVEs, scanning target groups, and executing staged deployments so security teams can meet Patch Tuesday SLAs while coordinating change control and validation activities.
View Details
Deploying Havoc C2 Infrastructure
building-red-team-c2-infrastructure-with-havoc
mukul975/Anthropic-Cybersecurity-Skills
416
Guide for deploying Havoc’s teamserver, configured HTTPS listeners, redirectors, and Demon agents so red teamers can run authorized, production-grade command-and-control infrastructure with proper OPSEC.
View Details
SOC Escalation Matrix
building-soc-escalation-matrix
mukul975/Anthropic-Cybersecurity-Skills
126
Defines a structured SOC escalation matrix covering severity tiers, response SLAs, escalation paths, and notification templates so security teams can align triage workflows to incident criticality and governance needs.
View Details
Ransomware SOC Playbook
building-soc-playbook-for-ransomware
mukul975/Anthropic-Cybersecurity-Skills
488
Creates a structured SOC ransomware response playbook with detection queries, triage decision trees, containment APIs, and evidence collection tied to NIST SP 800-61 and MITRE ATT&CK so teams can rehearse consistent procedures.
View Details
Vulnerability Scanning Workflow
building-vulnerability-scanning-workflow
mukul975/Anthropic-Cybersecurity-Skills
343
Defines a structured workflow with Nessus, Qualys, and OpenVAS to schedule scans, prioritize risks using asset context and CISA KEV data, and drive SIEM-integrated remediation tracking for SOC teams.
View Details
OSINT External Reconnaissance
conducting-external-reconnaissance-with-osint
mukul975/Anthropic-Cybersecurity-Skills
399
Uses OSINT techniques to map an organization’s external attack surface without hitting any systems directly; aggregates DNS, certificate, breach, social media, and cloud data for passive reconnaissance before penetration tests or red team engagements.
View Details
Comprehensive Red Team Engagement
conducting-full-scope-red-team-engagement
mukul975/Anthropic-Cybersecurity-Skills
427
Guides planning and execution of a full-scope red team engagement from reconnaissance through post-exploitation, using MITRE ATT&CK-aligned TTPs to measure an organization’s detection and response readiness with scripted phases and artifact collection.
View Details
BloodHound CE Recon Guide
conducting-internal-reconnaissance-with-bloodhound-ce
mukul975/Anthropic-Cybersecurity-Skills
426
Use BloodHound CE to map Active Directory attack paths, collect AD data with SharpHound, run Cypher queries, and prioritize privilege escalation chains during red-team assessments.
View Details
Pass-the-Ticket Attack
conducting-pass-the-ticket-attack
mukul975/Anthropic-Cybersecurity-Skills
469
Outlines how to extract Kerberos tickets from a compromised host and inject them into an attacker session, enabling lateral movement without requiring the target user’s password; useful for red team engagement and security control validation.
View Details
Prev
1
2
3
...
10
11
12
13
14
15
16
17
18
Next
Language
简体中文
English