Login
Download
Skill UI
Browse and discover
6252+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
red-team
, found
208
results
Default
Newest
Most Downloaded
Post-Incident Lessons Review
conducting-post-incident-lessons-learned
mukul975/Anthropic-Cybersecurity-Skills
178
Guides security teams through structured post-incident lessons-learned by collecting incident data, running blameless reviews, analyzing root causes, measuring response metrics, and updating playbooks.
View Details
Social Engineering Pretext Calls
conducting-social-engineering-pretext-call
mukul975/Anthropic-Cybersecurity-Skills
118
Guides red teams through planning and executing authorized vishing pretext calls, covering OSINT research, believable scenarios, objection handling, and data collection so assessors can evaluate employee verification habits and security awareness controls during security assessments or audits.
View Details
PowerShell Malware Deobfuscation
deobfuscating-powershell-obfuscated-malware
mukul975/Anthropic-Cybersecurity-Skills
374
Systematically deobfuscates layered PowerShell malware by combining AST analysis, PSDecode/PowerDecode, and dynamic tracing to reconstruct hidden payloads and expose C2 infrastructure during threat hunting or red team exercises.
View Details
Kerberos Golden Ticket Detection
detecting-golden-ticket-attacks-in-kerberos-logs
mukul975/Anthropic-Cybersecurity-Skills
386
Analyze domain controller Kerberos logs to spot Golden Ticket TGT anomalies such as RC4 encryption, impossible lifetimes, missing TGT requests, and forged PAC signatures, letting SOC teams hunt credential abuse and persistent AD footholds with Splunk or KQL queries.
View Details
Zeek Network Anomaly Detection
detecting-network-anomalies-with-zeek
mukul975/Anthropic-Cybersecurity-Skills
114
Deploys Zeek to passively monitor network traffic, emit structured connection/DNS/HTTP/SSL logs, and run custom scripts that flag anomalous behavior for threat hunting and incident response teams.
View Details
Shadow IT Cloud Detection
detecting-shadow-it-cloud-usage
mukul975/Anthropic-Cybersecurity-Skills
291
Analyzes proxy, DNS, and netflow logs with pandas to surface unauthorized SaaS usage, classify discovered domains, and score services so SOC teams can prioritize remediation.
View Details
Red Team Engagement Planning
executing-red-team-engagement-planning
mukul975/Anthropic-Cybersecurity-Skills
169
Framework for prepping red team engagements by defining scope, objectives, ROE, threat profiles, and operational timelines so offensive testing runs safely and reflects realistic adversary behavior.
View Details
Red Team Exercise Execution
executing-red-team-exercise
mukul975/Anthropic-Cybersecurity-Skills
476
Executes full-scope red team exercises that emulate real adversaries across recon, infiltration, and objective completion to validate detection, response, and SOC capabilities before staging live operations.
View Details
Exploiting AD CS ESC1
exploiting-active-directory-certificate-services-esc1
mukul975/Anthropic-Cybersecurity-Skills
383
Guide to abusing misconfigured Active Directory Certificate Services ESC1 templates to request certificates as high-privileged users, forge Domain Admin certs, authenticate via PKINIT, and escalate domain privileges during authorized red team exercises.
View Details
BloodHound Active Directory Recon
exploiting-active-directory-with-bloodhound
mukul975/Anthropic-Cybersecurity-Skills
79
BloodHound is a graph-based Active Directory reconnaissance workflow that helps red teams collect AD data with SharpHound or BloodHound.py, visualize attack paths, and document privilege escalation chains during authorized testing and response planning.
View Details
Constrained Delegation Abuse
exploiting-constrained-delegation-abuse
mukul975/Anthropic-Cybersecurity-Skills
304
Explains how to abuse Kerberos constrained delegation misconfigurations in Active Directory to impersonate privileged accounts via S4U2self/S4U2proxy, secure service tickets, and access CIFS/LDAP/HTTP targets for lateral movement and privilege escalation during red-team or authorized security exercises.
View Details
Kerberoasting With Impacket
exploiting-kerberoasting-with-impacket
mukul975/Anthropic-Cybersecurity-Skills
468
Guides red teamers through using Impacket's GetUserSPNs to enumerate service accounts, request Kerberos TGS tickets, and crack them offline as part of credential-access testing.
View Details
Prev
1
2
3
...
11
12
13
14
15
16
17
18
Next
Language
简体中文
English