detecting-evasion-techniques-in-endpoint-logs
mukul975/Anthropic-Cybersecurity-Skills
Detect defense-evasion techniques in endpoint logs by identifying log tampering, timestomping, process injection, security-tool disabling, and masquerading; use in threat hunting, detection engineering, or investigations that query telemetry from Sysmon, SIEM, or EDR.