Login
Download
Skill UI
Browse and discover
6557+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
security
, found
615
results
Default
Newest
Most Downloaded
Proofpoint Email Security Gateway
implementing-proofpoint-email-security-gateway
mukul975/Anthropic-Cybersecurity-Skills
489
Guides security teams through deploying and configuring the Proofpoint Email Protection gateway so inbound and outbound traffic can be inspected, authenticated, and remediated for phishing, malware, BEC, and spam before it reaches inboxes.
View Details
Deploy Rapid7 InsightVM
implementing-rapid7-insightvm-for-scanning
mukul975/Anthropic-Cybersecurity-Skills
309
Orchestrates Rapid7 InsightVM Security Console, distributed Scan Engines, and Insight Agents to deploy authenticated and unauthenticated vulnerability scans, schedule asset discovery/compliance templates, and deliver continuous reporting across enterprise environments.
View Details
Runtime Security with Tetragon
implementing-runtime-security-with-tetragon
mukul975/Anthropic-Cybersecurity-Skills
438
Deploys Cilium Tetragon to leverage eBPF for kernel-level observability and enforcement across Kubernetes workloads, enabling monitoring of processes, files, syscalls, and network activity to detect threats and enforce security policies with minimal overhead.
View Details
Secrets Scanning CI/CD
implementing-secrets-scanning-in-ci-cd
mukul975/Anthropic-Cybersecurity-Skills
289
Automates gitleaks and trufflehog scans in CI/CD pipelines to detect leaked credentials, parse findings by severity, and gate deployments before release for compliance-focused security teams.
View Details
Security Chaos Engineering
implementing-security-chaos-engineering
mukul975/Anthropic-Cybersecurity-Skills
371
Implements security chaos engineering experiments that disable or degrade controls, testing WAF bypass, firewall removal, log pipeline disruption, and EDR disablement to validate SOC detection and response.
View Details
STIX 2.1 Threat Sharing
implementing-security-information-sharing-with-stix2
mukul975/Anthropic-Cybersecurity-Skills
466
Use the stix2 Python library to craft, validate, and bundle STIX 2.1 SDOs/SROs, enrich indicators with malware and campaign context, and publish via TAXII 2.1 so SIEMs and SOARs can consume shared intelligence.
View Details
Datadog Security Monitoring
implementing-security-monitoring-with-datadog
mukul975/Anthropic-Cybersecurity-Skills
268
Implements Datadog Cloud SIEM, Cloud Security Management, and Workload Protection to ingest critical cloud and hybrid logs, configure detection rules, and surface alerts/dashboards for compliance-driven threat monitoring.
View Details
SIEM Detection Use Cases
implementing-siem-use-cases-for-detection
mukul975/Anthropic-Cybersecurity-Skills
279
Guides SOC teams through building SIEM detection use cases by mapping MITRE ATT&CK techniques, designing correlation rules, and implementing alerts across Splunk, Elastic Security, and Sentinel to formalize lifecycle management and expand coverage for compliance and threat scenarios.
View Details
In-Toto Supply Chain Security
implementing-supply-chain-security-with-in-toto
mukul975/Anthropic-Cybersecurity-Skills
255
Leverage the CNCF in-toto framework to capture and verify cryptographically signed attestations for each CI/CD step, ensuring container images follow approved build layouts, provenance checks, and SBOM scans before deployment.
View Details
OpenTAXII TAXII Server
implementing-taxii-server-with-opentaxii
mukul975/Anthropic-Cybersecurity-Skills
241
Deploy and configure an OpenTAXII TAXII 2.1 server to share STIX 2.1 threat intelligence, define collections, publish bundles, and integrate with SIEM/SOAR tools for automated indicator exchange and compliance-ready security architecture.
View Details
Greenbone Vulnerability Automation
implementing-vulnerability-management-with-greenbone
mukul975/Anthropic-Cybersecurity-Skills
91
Automate deployment and operation of Greenbone/OpenVAS vulnerability management using python-gvm and GMP to create scan targets, run tasks, parse XML reports, and emit JSON summaries that surface CVSS scores and remediation priorities for compliance-driven security teams.
View Details
Vulnerability SLA Alerting
implementing-vulnerability-sla-breach-alerting
mukul975/Anthropic-Cybersecurity-Skills
268
Automates alerting pipelines for vulnerability remediation SLA breaches, tracks severity-based deadlines, triggers escalation workflows, and feeds compliance dashboards so security teams can surface and resolve overdue findings reliably.
View Details
Prev
1
2
3
...
36
37
38
39
40
41
42
...
50
51
52
Next
Language
简体中文
English