mukul975/anthropic-cybersecurity-skills
Skill
Installs
analyzing-cyber-kill-chain
10
analyzing-certificate-transparency-for-phishing
9
analyzing-network-traffic-with-wireshark
9
analyzing-android-malware-with-apktool
9
analyzing-apt-group-with-mitre-navigator
8
analyzing-dns-logs-for-exfiltration
8
analyzing-email-headers-for-phishing-investigation
8
acquiring-disk-image-with-dd-and-dcfldd
8
analyzing-linux-system-artifacts
8
analyzing-active-directory-acl-abuse
8
analyzing-browser-forensics-with-hindsight
8
analyzing-ios-app-security-with-objection
8
analyzing-api-gateway-access-logs
8
analyzing-ethereum-smart-contract-vulnerabilities
8
analyzing-cloud-storage-access-patterns
7
analyzing-azure-activity-logs-for-threats
7
analyzing-linux-kernel-rootkits
7
analyzing-network-traffic-for-incidents
7
analyzing-cobaltstrike-malleable-c2-profiles
7
analyzing-network-covert-channels-in-malware
7
analyzing-network-flow-data-with-netflow
7
analyzing-disk-image-with-autopsy
7
analyzing-docker-container-forensics
7
analyzing-linux-audit-logs-for-intrusion
7
analyzing-network-traffic-of-malware
7
analyzing-cobalt-strike-malleable-profiles
7
analyzing-network-packets-with-scapy
7
analyzing-command-and-control-communication
7
analyzing-bootkit-and-rootkit-samples
7
analyzing-campaign-attribution-evidence
7
analyzing-cobalt-strike-beacon-configuration
7
analyzing-indicators-of-compromise
7
analyzing-macro-malware-in-office-documents
6
analyzing-heap-spray-exploitation
6
analyzing-malicious-pdf-with-peepdf
6
analyzing-kubernetes-audit-logs
6
analyzing-golang-malware-with-ghidra
6
analyzing-linux-elf-malware
6
analyzing-lnk-file-and-jump-list-artifacts
6
analyzing-web-server-logs-for-intrusion
6
analyzing-mft-for-deleted-file-recovery
6
analyzing-office365-audit-logs-for-compromise
6
analyzing-threat-actor-ttps-with-mitre-attack
6
analyzing-windows-event-logs-in-splunk
6
exploiting-api-injection-vulnerabilities
6
analyzing-outlook-pst-for-email-forensics
6
exploiting-nosql-injection-vulnerabilities
6
analyzing-packed-malware-with-upx-unpacker
6
testing-for-xss-vulnerabilities
5
testing-api-security-with-owasp-top-10
5
testing-oauth2-implementation-flaws
5
testing-for-xxe-injection-vulnerabilities
5
analyzing-pdf-malware-with-pdfid
5
conducting-full-scope-red-team-engagement
5
testing-mobile-api-authentication
5
testing-for-xss-vulnerabilities-with-burpsuite
5
analyzing-malware-behavior-with-cuckoo-sandbox
5
collecting-open-source-intelligence
5
analyzing-tls-certificate-transparency-logs
5
analyzing-windows-amcache-artifacts
5
analyzing-threat-intelligence-feeds
5
testing-websocket-api-security
5
building-cloud-security-posture-management
5
analyzing-threat-actor-ttps-with-mitre-navigator
5
analyzing-ransomware-encryption-mechanisms
5
auditing-cloud-with-cis-benchmarks
5
exploiting-sql-injection-vulnerabilities
5
building-vulnerability-dashboard-with-defectdojo
4
conducting-cloud-incident-response
4
analyzing-malware-family-relationships-with-malpedia
4
building-vulnerability-aging-and-sla-tracking
4
analyzing-security-logs-with-splunk
4
analyzing-malicious-url-with-urlscan
4
exploiting-websocket-vulnerabilities
4
testing-cors-misconfiguration
4
testing-for-business-logic-vulnerabilities
4
conducting-wireless-network-penetration-test
4
exploiting-oauth-misconfiguration
4
analyzing-malware-persistence-with-autoruns
4
exploiting-server-side-request-forgery
4
building-threat-intelligence-platform
4
testing-for-sensitive-data-exposure
4
analyzing-memory-forensics-with-lime-and-volatility
4
testing-jwt-token-security
4
analyzing-windows-registry-for-artifacts
4
testing-for-xml-injection-vulnerabilities
4
extracting-browser-history-artifacts
4
testing-api-for-broken-object-level-authorization
4
testing-for-email-header-injection
4
analyzing-ransomware-network-indicators
4
tracking-threat-actor-infrastructure
4
analyzing-memory-dumps-with-volatility
4
exploiting-idor-vulnerabilities
4
exploiting-active-directory-certificate-services-esc1
4
analyzing-phishing-email-headers
4
exploiting-bgp-hijacking-vulnerabilities
4
triaging-security-alerts-in-splunk
4
triaging-security-incident
4
exploiting-sql-injection-with-sqlmap
4
executing-red-team-exercise
4
building-threat-intelligence-enrichment-in-splunk
4
analyzing-ransomware-leak-site-intelligence
4
analyzing-malware-sandbox-evasion-techniques
4
testing-api-authentication-weaknesses
4
analyzing-threat-landscape-with-misp
3
analyzing-windows-lnk-files-for-artifacts
3
performing-power-grid-cybersecurity-assessment
3
analyzing-windows-shellbag-artifacts
3
analyzing-supply-chain-malware-artifacts
3
analyzing-persistence-mechanisms-in-linux
3
building-vulnerability-exception-tracking-system
3
performing-web-application-scanning-with-nikto
3
bypassing-authentication-with-forced-browsing
3
performing-web-application-penetration-test
3
analyzing-slack-space-and-file-system-artifacts
3
analyzing-powershell-script-block-logging
3
auditing-aws-s3-bucket-permissions
3
performing-directory-traversal-testing
3
building-threat-intelligence-feed-integration
3
analyzing-prefetch-files-for-execution-history
3
performing-web-cache-deception-attack
3
exploiting-http-request-smuggling
3
collecting-threat-intelligence-with-misp
3
conducting-cloud-penetration-testing
3
analyzing-windows-prefetch-with-python
3
performing-web-cache-poisoning-attack
3
exploiting-mass-assignment-in-rest-apis
3
testing-for-broken-access-control
3
building-vulnerability-scanning-workflow
3
conducting-mobile-application-penetration-test
3
executing-red-team-engagement-planning
3
building-threat-actor-profile-from-osint
3
conducting-cloud-infrastructure-penetration-test
3
building-soc-playbook-for-ransomware
3
testing-for-json-web-token-vulnerabilities
3
conducting-mobile-app-penetration-test
3
performing-web-application-firewall-bypass
3
analyzing-typosquatting-domains-with-dnstwist
3
auditing-gcp-iam-permissions
3
testing-for-host-header-injection
3
performing-vulnerability-scanning-with-nessus
3
analyzing-usb-device-connection-history
3
collecting-indicators-of-compromise
3
conducting-network-penetration-test
3
auditing-azure-active-directory-configuration
3
analyzing-powershell-empire-artifacts
3
testing-for-open-redirect-vulnerabilities
3
exploiting-deeplink-vulnerabilities
3
automating-ioc-enrichment
2
deploying-ransomware-canary-files
2
correlating-threat-campaigns
2
triaging-vulnerabilities-with-ssvc-framework
2
building-automated-malware-submission-pipeline
2
conducting-pass-the-ticket-attack
2
testing-android-intents-for-vulnerabilities
2
performing-blind-ssrf-exploitation
2
conducting-post-incident-lessons-learned
2
detecting-dnp3-protocol-anomalies
2
auditing-terraform-infrastructure-for-security
2
building-detection-rule-with-splunk-spl
2
exploiting-type-juggling-vulnerabilities
2
building-threat-hunt-hypothesis-framework
2
performing-privilege-escalation-on-linux
2
exploiting-template-injection-vulnerabilities
2
auditing-kubernetes-rbac-permissions
2
exploiting-broken-link-hijacking
2
conducting-api-security-testing
2
detecting-dll-sideloading-attacks
2
securing-kubernetes-on-cloud
2
containing-active-security-breach
2
building-c2-infrastructure-with-sliver-framework
2
conducting-malware-incident-response
2
exploiting-vulnerabilities-with-metasploit-framework
2
deobfuscating-powershell-obfuscated-malware
2
building-role-mining-for-rbac-optimization
2
exploiting-insecure-data-storage-in-mobile
2
generating-threat-intelligence-reports
2
conducting-social-engineering-pretext-call
2
scanning-containers-with-trivy-in-cicd
2
performing-web-application-vulnerability-triage
2
auditing-kubernetes-cluster-rbac
2
scanning-docker-images-with-trivy
2
performing-ssrf-vulnerability-exploitation
2
exploiting-prototype-pollution-in-javascript
2
exploiting-excessive-data-exposure-in-api
2
exploiting-insecure-deserialization
2
conducting-social-engineering-penetration-test
2
performing-second-order-sql-injection
2
performing-graphql-security-assessment
2
performing-authenticated-vulnerability-scan
2
building-cloud-siem-with-sentinel
2
exploiting-race-condition-vulnerabilities
2
conducting-man-in-the-middle-attack-simulation
2
collecting-volatile-evidence-from-compromised-host
2
performing-kubernetes-penetration-testing
2
triaging-security-incident-with-ir-playbook
2
performing-api-rate-limiting-bypass
2
performing-active-directory-penetration-test
2
securing-api-gateway-with-aws-waf
2
conducting-external-reconnaissance-with-osint
2
building-detection-rules-with-sigma
2
conducting-memory-forensics-with-volatility
2
testing-api-for-mass-assignment-vulnerability
2
building-threat-feed-aggregation-with-misp
2
prioritizing-vulnerabilities-with-cvss-scoring
2
detecting-api-enumeration-attacks
2
deploying-tailscale-for-zero-trust-vpn
2
exploiting-active-directory-with-bloodhound
2
performing-cloud-penetration-testing
2
building-adversary-infrastructure-tracking-system
2
deploying-palo-alto-prisma-access-zero-trust
2
performing-firmware-malware-analysis
2
performing-dark-web-monitoring-for-threats
2
building-attack-pattern-library-from-cti-reports
2
building-soc-metrics-and-kpi-tracking
2
detecting-anomalies-in-industrial-control-systems
2
containing-active-breach
2
managing-intelligence-lifecycle
1
performing-phishing-simulation-with-gophish
1
deploying-cloudflare-access-for-zero-trust
1
implementing-api-security-posture-management
1
monitoring-darkweb-sources
1
securing-aws-lambda-execution-roles
1
implementing-google-workspace-phishing-protection
1
performing-agentless-vulnerability-scanning
1
implementing-network-segmentation-for-ot
1
implementing-vulnerability-remediation-sla
1
building-ioc-defanging-and-sharing-pipeline
1
performing-dns-enumeration-and-zone-transfer
1
hunting-for-spearphishing-indicators
1
mapping-mitre-attack-techniques
1
performing-threat-emulation-with-atomic-red-team
1
building-identity-governance-lifecycle-process
1
performing-service-account-credential-rotation
1
configuring-active-directory-tiered-model
1
implementing-semgrep-for-custom-sast-rules
1
configuring-zscaler-private-access-for-ztna
1
configuring-windows-defender-advanced-settings
1
building-phishing-reporting-button-workflow
1
securing-container-registry-images
1
exploiting-zerologon-vulnerability-cve-2020-1472
1
performing-brand-monitoring-for-impersonation
1
detecting-email-account-compromise
1
building-incident-response-playbook
1
detecting-living-off-the-land-with-lolbas
1
reverse-engineering-ios-app-with-frida
1
implementing-network-intrusion-prevention-with-suricata
1
implementing-google-workspace-admin-security
1
building-ioc-enrichment-pipeline-with-opencti
1
implementing-dragos-platform-for-ot-monitoring
1
detecting-cloud-cryptomining-activity
1
conducting-phishing-incident-response
1
implementing-next-generation-firewall-with-palo-alto
1
configuring-ldap-security-hardening
1
hunting-for-data-staging-before-exfiltration
1
implementing-google-workspace-sso-configuration
1
reverse-engineering-rust-malware
1
performing-privileged-account-access-review
1
scanning-container-images-with-grype
1
securing-serverless-functions
1
detecting-attacks-on-historian-servers
1
implementing-pod-security-admission-controller
1
configuring-network-segmentation-with-vlans
1
implementing-pci-dss-compliance-controls
1
hardening-docker-containers-for-production
1
deploying-edr-agent-with-crowdstrike
1
implementing-network-traffic-baselining
1
configuring-aws-verified-access-for-ztna
1
performing-linux-log-forensics-investigation
1
configuring-tls-1-3-for-secure-communications
1
implementing-mtls-for-zero-trust-services
1
hardening-windows-endpoint-with-cis-benchmark
1
implementing-threat-intelligence-platform
1
securing-remote-access-to-ot-environment
1
performing-hash-cracking-with-hashcat
1
performing-cloud-asset-inventory-with-cartography
1
configuring-suricata-for-network-monitoring
1
implementing-network-access-control-with-cisco-ise
1
performing-api-inventory-and-discovery
1
performing-kerberoasting-attack
1
performing-red-team-with-covenant
1
detecting-anomalous-authentication-patterns
1
performing-cloud-native-forensics-with-falco
1
implementing-web-application-logging-with-modsecurity
1
performing-aws-privilege-escalation-assessment
1
scanning-infrastructure-with-nessus
1
reverse-engineering-malware-with-ghidra
1
detecting-network-scanning-with-ids-signatures
1
hunting-advanced-persistent-threats
1
deobfuscating-javascript-malware
1
implementing-cloud-workload-protection
1
securing-container-registry-with-harbor
1
performing-jwt-none-algorithm-attack
1
performing-privilege-escalation-assessment
1
building-identity-federation-with-saml-azure-ad
1
hunting-for-ntlm-relay-attacks
1
exploiting-ipv6-vulnerabilities
1
exploiting-ms17-010-eternalblue-vulnerability
1
implementing-network-deception-with-honeypots
1
implementing-supply-chain-security-with-in-toto
1
conducting-internal-reconnaissance-with-bloodhound-ce
1
implementing-zero-trust-network-access-with-zscaler
1
scanning-network-with-nmap-advanced
1
implementing-alert-fatigue-reduction
1
exploiting-broken-function-level-authorization
1
performing-cloud-forensics-investigation
1
hunting-for-data-exfiltration-indicators
1
performing-container-security-scanning-with-trivy
1
conducting-internal-network-penetration-test
1
configuring-identity-aware-proxy-with-google-iap
1
performing-active-directory-forest-trust-attack
1
performing-vlan-hopping-attack
1
exploiting-jwt-algorithm-confusion-attack
1
performing-authenticated-scan-with-openvas
1
performing-dynamic-analysis-of-android-app
1
hunting-credential-stuffing-attacks
1
configuring-hsm-for-key-storage
1
building-red-team-c2-infrastructure-with-havoc
1
implementing-zero-standing-privilege-with-cyberark
1
implementing-zero-trust-with-hashicorp-boundary
1
implementing-cloud-waf-rules
1
securing-historian-server-in-ot-environment
1
detecting-modbus-protocol-anomalies
1
implementing-iso-27001-information-security-management
1
deploying-osquery-for-endpoint-monitoring
1
hunting-for-dns-based-persistence
1
configuring-snort-ids-for-intrusion-detection
1
performing-privileged-account-discovery
1
performing-fuzzing-with-aflplusplus
1
building-devsecops-pipeline-with-gitlab-ci
1
implementing-vulnerability-management-with-greenbone
1
implementing-network-policies-for-kubernetes
1
implementing-mitre-attack-coverage-mapping
1
detecting-dns-exfiltration-with-dns-query-analysis
1
performing-graphql-introspection-attack
1
implementing-zero-trust-with-beyondcorp
1
configuring-oauth2-authorization-flow
1
detecting-dcsync-attack-in-active-directory
1
remediating-s3-bucket-misconfiguration
1
scanning-kubernetes-manifests-with-kubesec
1
performing-plc-firmware-security-analysis
1
performing-physical-intrusion-assessment
1
performing-wireless-network-penetration-test
1
implementing-network-access-control
1
performing-ransomware-response
1
performing-endpoint-vulnerability-remediation
1
configuring-certificate-authority-with-openssl
1
evaluating-threat-intelligence-platforms
1
performing-purple-team-exercise
1
securing-azure-with-microsoft-defender
1
performing-dns-tunneling-detection
1
hardening-linux-endpoint-with-cis-benchmark
1
conducting-domain-persistence-with-dcsync
1
performing-clickjacking-attack-test
1
implementing-iec-62443-security-zones
1
configuring-microsegmentation-for-zero-trust
1
implementing-zero-trust-network-access
1
performing-android-app-static-analysis-with-mobsf
1
building-soc-escalation-matrix
1
eradicating-malware-from-infected-systems
1
implementing-zero-trust-in-cloud
1
implementing-mimecast-targeted-attack-protection
1
securing-helm-chart-deployments
1
performing-container-image-hardening
1
implementing-vulnerability-sla-breach-alerting
1
performing-kubernetes-cis-benchmark-with-kube-bench
1
implementing-aws-iam-permission-boundaries
1
performing-red-team-phishing-with-gophish
1
detecting-living-off-the-land-attacks
1
implementing-network-traffic-analysis-with-arkime
1
deploying-software-defined-perimeter
1
performing-steganography-detection
1
detecting-cryptomining-in-cloud
1
detecting-lateral-movement-in-network
1
implementing-cloud-security-posture-management
1
reverse-engineering-android-malware-with-jadx
1
securing-github-actions-workflows
1
implementing-cloud-vulnerability-posture-management
1
implementing-infrastructure-as-code-security-scanning
1
performing-ransomware-incident-response
1
detecting-lateral-movement-with-splunk
1
implementing-zero-knowledge-proof-for-authentication
1
performing-endpoint-forensics-investigation
1
performing-external-network-penetration-test
1
detecting-modbus-command-injection-attacks
1
configuring-host-based-intrusion-detection
1
securing-aws-iam-permissions
1
implementing-zero-trust-dns-with-nextdns
1
configuring-multi-factor-authentication-with-duo
1
implementing-aws-config-rules-for-compliance
1
hunting-for-domain-fronting-c2-traffic
1
hunting-for-webshells-in-web-servers
1
integrating-dast-with-owasp-zap-in-pipeline
1
performing-active-directory-compromise-investigation
1
intercepting-mobile-traffic-with-burpsuite
1
implementing-zero-trust-for-saas-applications
1
performing-cloud-penetration-testing-with-pacu
1
integrating-sast-into-github-actions-pipeline
1
performing-soap-web-service-security-testing
1
configuring-pfsense-firewall-rules
1
implementing-threat-intelligence-lifecycle-management
1
exploiting-kerberoasting-with-impacket
1
hunting-for-supply-chain-compromise
1
exploiting-smb-vulnerabilities-with-metasploit
1
building-incident-response-dashboard
1
building-patch-tuesday-response-process
1
detecting-arp-poisoning-in-network-traffic
1
extracting-iocs-from-malware-samples
1
performing-subdomain-enumeration-with-subfinder
1
implementing-network-segmentation-with-firewall-zones
1
detecting-network-anomalies-with-zeek
1
conducting-spearphishing-simulation-campaign
1
correlating-security-events-in-qradar
1
detecting-email-forwarding-rules-attack
1