Login
Download
Skill UI
Browse and discover
6581+
curated skills
All
Development
Artificial Intelligence
Design & Creative
Product & Business
Data Science
Marketing
Soft Skills
Productivity
Engineering
Languages
Search
ty
, found
2014
results
Default
Newest
Most Downloaded
Cloud Incident Response
conducting-cloud-incident-response
mukul975/Anthropic-Cybersecurity-Skills
403
Guides responders through cloud incident response operations across AWS, Azure, and GCP, covering detection, identity containment, isolation, and forensic evidence preservation.
View Details
BloodHound CE Recon
conducting-internal-reconnaissance-with-bloodhound-ce
mukul975/Anthropic-Cybersecurity-Skills
199
Use BloodHound CE to map Active Directory attack paths, import SharpHound collections, run custom Cypher queries, and prioritize escalation chains for red team reconnaissance and security validation.
View Details
Volatility Memory Forensics
conducting-memory-forensics-with-volatility
mukul975/Anthropic-Cybersecurity-Skills
500
Guides analysts through Volatility 3 memory forensics to extract malware execution, process injection, network connections, and credential theft artifacts from RAM dumps during incident response.
View Details
Network Penetration Assessment
conducting-network-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
490
Guides comprehensive pen tests covering discovery, scanning, enumeration, vulnerability validation, controlled exploitation, and reporting to benchmark network security and compliance readiness.
View Details
Social Engineering Pentest
conducting-social-engineering-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
131
Design and execute comprehensive social engineering penetration tests, covering phishing, vishing, smishing, and physical pretexting to measure human security resilience and reveal training gaps.
View Details
Social Engineering Pretext Call
conducting-social-engineering-pretext-call
mukul975/Anthropic-Cybersecurity-Skills
437
Conduct authorized vishing pretext calls to assess employee susceptibility, validate verification workflows, and benchmark security awareness during red team engagements and security audits.
View Details
Wireless Network Penetration Test
conducting-wireless-network-penetration-test
mukul975/Anthropic-Cybersecurity-Skills
217
Conducts authorized wireless network penetration tests to evaluate WiFi security through scouting, WPA2/WPA3 handshake capture, rogue APs, evil twin deployment, enterprise credential attacks, and segmentation checks to validate WIDS/WIPS defenses.
View Details
Active Directory Tiered Security
configuring-active-directory-tiered-model
mukul975/Anthropic-Cybersecurity-Skills
53
Defines how to implement Microsoft’s Enhanced Security Admin Environment (ESAE) tiered administration model for Active Directory, covering Tier 0/1/2 separation, PAWs, authentication silos, and controls to harden privileged access and support compliance reporting.
View Details
AWS Verified Access ZTNA
configuring-aws-verified-access-for-ztna
mukul975/Anthropic-Cybersecurity-Skills
52
Guide to deploying AWS Verified Access for VPN-less Zero Trust Network Access, covering identity and device trust providers, Cedar policies, resource sharing, and endpoint configuration for secure internal application access.
View Details
OpenSSL Certificate Authority Setup
configuring-certificate-authority-with-openssl
mukul975/Anthropic-Cybersecurity-Skills
105
Guides building a two-tier OpenSSL-based certificate authority hierarchy with Python cryptography, covering root and intermediate CA creation, certificate issuance, CRL/OCSP configuration, and policy enforcement for secure deployments.
View Details
Host-Based Intrusion Configuration
configuring-host-based-intrusion-detection
mukul975/Anthropic-Cybersecurity-Skills
59
Guides configuring host-based intrusion detection (HIDS) with Wazuh/OSSEC/AIDE, covering agent installs, file integrity monitoring, rootkit checks, log rules, and active responses so endpoints stay compliant and feed SIEMs.
View Details
Configuring HSM Key Storage
configuring-hsm-for-key-storage
mukul975/Anthropic-Cybersecurity-Skills
323
Guide for configuring Hardware Security Modules with the PKCS#11 interface to generate, manage, and operate on keys securely, covering SoftHSM2 development setups and cloud HSM integrations for compliance and hardened deployments.
View Details
Prev
1
2
3
...
121
122
123
124
125
126
127
...
166
167
168
Next
Language
简体中文
English