skills/mukul975/anthropic-cybersecurity-skills

mukul975/anthropic-cybersecurity-skills

414 skills1.0K total installsGithubGithubGitHub

analyzing-cyber-kill-chain

10

analyzing-certificate-transparency-for-phishing

9

analyzing-network-traffic-with-wireshark

9

analyzing-android-malware-with-apktool

9

analyzing-apt-group-with-mitre-navigator

8

analyzing-dns-logs-for-exfiltration

8

analyzing-email-headers-for-phishing-investigation

8

acquiring-disk-image-with-dd-and-dcfldd

8

analyzing-linux-system-artifacts

8

analyzing-active-directory-acl-abuse

8

analyzing-browser-forensics-with-hindsight

8

analyzing-ios-app-security-with-objection

8

analyzing-api-gateway-access-logs

8

analyzing-ethereum-smart-contract-vulnerabilities

8

analyzing-cloud-storage-access-patterns

7

analyzing-azure-activity-logs-for-threats

7

analyzing-linux-kernel-rootkits

7

analyzing-network-traffic-for-incidents

7

analyzing-cobaltstrike-malleable-c2-profiles

7

analyzing-network-covert-channels-in-malware

7

analyzing-network-flow-data-with-netflow

7

analyzing-disk-image-with-autopsy

7

analyzing-docker-container-forensics

7

analyzing-linux-audit-logs-for-intrusion

7

analyzing-network-traffic-of-malware

7

analyzing-cobalt-strike-malleable-profiles

7

analyzing-network-packets-with-scapy

7

analyzing-command-and-control-communication

7

analyzing-bootkit-and-rootkit-samples

7

analyzing-campaign-attribution-evidence

7

analyzing-cobalt-strike-beacon-configuration

7

analyzing-indicators-of-compromise

7

analyzing-macro-malware-in-office-documents

6

analyzing-heap-spray-exploitation

6

analyzing-malicious-pdf-with-peepdf

6

analyzing-kubernetes-audit-logs

6

analyzing-golang-malware-with-ghidra

6

analyzing-linux-elf-malware

6

analyzing-lnk-file-and-jump-list-artifacts

6

analyzing-web-server-logs-for-intrusion

6

analyzing-mft-for-deleted-file-recovery

6

analyzing-office365-audit-logs-for-compromise

6

analyzing-threat-actor-ttps-with-mitre-attack

6

analyzing-windows-event-logs-in-splunk

6

exploiting-api-injection-vulnerabilities

6

analyzing-outlook-pst-for-email-forensics

6

exploiting-nosql-injection-vulnerabilities

6

analyzing-packed-malware-with-upx-unpacker

6

testing-for-xss-vulnerabilities

5

testing-api-security-with-owasp-top-10

5

testing-oauth2-implementation-flaws

5

testing-for-xxe-injection-vulnerabilities

5

analyzing-pdf-malware-with-pdfid

5

conducting-full-scope-red-team-engagement

5

testing-mobile-api-authentication

5

testing-for-xss-vulnerabilities-with-burpsuite

5

analyzing-malware-behavior-with-cuckoo-sandbox

5

collecting-open-source-intelligence

5

analyzing-tls-certificate-transparency-logs

5

analyzing-windows-amcache-artifacts

5

analyzing-threat-intelligence-feeds

5

testing-websocket-api-security

5

building-cloud-security-posture-management

5

analyzing-threat-actor-ttps-with-mitre-navigator

5

analyzing-ransomware-encryption-mechanisms

5

auditing-cloud-with-cis-benchmarks

5

exploiting-sql-injection-vulnerabilities

5

building-vulnerability-dashboard-with-defectdojo

4

conducting-cloud-incident-response

4

analyzing-malware-family-relationships-with-malpedia

4

building-vulnerability-aging-and-sla-tracking

4

analyzing-security-logs-with-splunk

4

analyzing-malicious-url-with-urlscan

4

exploiting-websocket-vulnerabilities

4

testing-cors-misconfiguration

4

testing-for-business-logic-vulnerabilities

4

conducting-wireless-network-penetration-test

4

exploiting-oauth-misconfiguration

4

analyzing-malware-persistence-with-autoruns

4

exploiting-server-side-request-forgery

4

building-threat-intelligence-platform

4

testing-for-sensitive-data-exposure

4

analyzing-memory-forensics-with-lime-and-volatility

4

testing-jwt-token-security

4

analyzing-windows-registry-for-artifacts

4

testing-for-xml-injection-vulnerabilities

4

extracting-browser-history-artifacts

4

testing-api-for-broken-object-level-authorization

4

testing-for-email-header-injection

4

analyzing-ransomware-network-indicators

4

tracking-threat-actor-infrastructure

4

analyzing-memory-dumps-with-volatility

4

exploiting-idor-vulnerabilities

4

exploiting-active-directory-certificate-services-esc1

4

analyzing-phishing-email-headers

4

exploiting-bgp-hijacking-vulnerabilities

4

triaging-security-alerts-in-splunk

4

triaging-security-incident

4

exploiting-sql-injection-with-sqlmap

4

executing-red-team-exercise

4

building-threat-intelligence-enrichment-in-splunk

4

analyzing-ransomware-leak-site-intelligence

4

analyzing-malware-sandbox-evasion-techniques

4

testing-api-authentication-weaknesses

4

analyzing-threat-landscape-with-misp

3

analyzing-windows-lnk-files-for-artifacts

3

performing-power-grid-cybersecurity-assessment

3

analyzing-windows-shellbag-artifacts

3

analyzing-supply-chain-malware-artifacts

3

analyzing-persistence-mechanisms-in-linux

3

building-vulnerability-exception-tracking-system

3

performing-web-application-scanning-with-nikto

3

bypassing-authentication-with-forced-browsing

3

performing-web-application-penetration-test

3

analyzing-slack-space-and-file-system-artifacts

3

analyzing-powershell-script-block-logging

3

auditing-aws-s3-bucket-permissions

3

performing-directory-traversal-testing

3

building-threat-intelligence-feed-integration

3

analyzing-prefetch-files-for-execution-history

3

performing-web-cache-deception-attack

3

exploiting-http-request-smuggling

3

collecting-threat-intelligence-with-misp

3

conducting-cloud-penetration-testing

3

analyzing-windows-prefetch-with-python

3

performing-web-cache-poisoning-attack

3

exploiting-mass-assignment-in-rest-apis

3

testing-for-broken-access-control

3

building-vulnerability-scanning-workflow

3

conducting-mobile-application-penetration-test

3

executing-red-team-engagement-planning

3

building-threat-actor-profile-from-osint

3

conducting-cloud-infrastructure-penetration-test

3

building-soc-playbook-for-ransomware

3

testing-for-json-web-token-vulnerabilities

3

conducting-mobile-app-penetration-test

3

performing-web-application-firewall-bypass

3

analyzing-typosquatting-domains-with-dnstwist

3

auditing-gcp-iam-permissions

3

testing-for-host-header-injection

3

performing-vulnerability-scanning-with-nessus

3

analyzing-usb-device-connection-history

3

collecting-indicators-of-compromise

3

conducting-network-penetration-test

3

auditing-azure-active-directory-configuration

3

analyzing-powershell-empire-artifacts

3

testing-for-open-redirect-vulnerabilities

3

exploiting-deeplink-vulnerabilities

3

automating-ioc-enrichment

2

deploying-ransomware-canary-files

2

correlating-threat-campaigns

2

triaging-vulnerabilities-with-ssvc-framework

2

building-automated-malware-submission-pipeline

2

conducting-pass-the-ticket-attack

2

testing-android-intents-for-vulnerabilities

2

performing-blind-ssrf-exploitation

2

conducting-post-incident-lessons-learned

2

detecting-dnp3-protocol-anomalies

2

auditing-terraform-infrastructure-for-security

2

building-detection-rule-with-splunk-spl

2

exploiting-type-juggling-vulnerabilities

2

building-threat-hunt-hypothesis-framework

2

performing-privilege-escalation-on-linux

2

exploiting-template-injection-vulnerabilities

2

auditing-kubernetes-rbac-permissions

2

exploiting-broken-link-hijacking

2

conducting-api-security-testing

2

detecting-dll-sideloading-attacks

2

securing-kubernetes-on-cloud

2

containing-active-security-breach

2

building-c2-infrastructure-with-sliver-framework

2

conducting-malware-incident-response

2

exploiting-vulnerabilities-with-metasploit-framework

2

deobfuscating-powershell-obfuscated-malware

2

building-role-mining-for-rbac-optimization

2

exploiting-insecure-data-storage-in-mobile

2

generating-threat-intelligence-reports

2

conducting-social-engineering-pretext-call

2

scanning-containers-with-trivy-in-cicd

2

performing-web-application-vulnerability-triage

2

auditing-kubernetes-cluster-rbac

2

scanning-docker-images-with-trivy

2

performing-ssrf-vulnerability-exploitation

2

exploiting-prototype-pollution-in-javascript

2

exploiting-excessive-data-exposure-in-api

2

exploiting-insecure-deserialization

2

conducting-social-engineering-penetration-test

2

performing-second-order-sql-injection

2

performing-graphql-security-assessment

2

performing-authenticated-vulnerability-scan

2

building-cloud-siem-with-sentinel

2

exploiting-race-condition-vulnerabilities

2

conducting-man-in-the-middle-attack-simulation

2

collecting-volatile-evidence-from-compromised-host

2

performing-kubernetes-penetration-testing

2

triaging-security-incident-with-ir-playbook

2

performing-api-rate-limiting-bypass

2

performing-active-directory-penetration-test

2

securing-api-gateway-with-aws-waf

2

conducting-external-reconnaissance-with-osint

2

building-detection-rules-with-sigma

2

conducting-memory-forensics-with-volatility

2

testing-api-for-mass-assignment-vulnerability

2

building-threat-feed-aggregation-with-misp

2

prioritizing-vulnerabilities-with-cvss-scoring

2

detecting-api-enumeration-attacks

2

deploying-tailscale-for-zero-trust-vpn

2

exploiting-active-directory-with-bloodhound

2

performing-cloud-penetration-testing

2

building-adversary-infrastructure-tracking-system

2

deploying-palo-alto-prisma-access-zero-trust

2

performing-firmware-malware-analysis

2

performing-dark-web-monitoring-for-threats

2

building-attack-pattern-library-from-cti-reports

2

building-soc-metrics-and-kpi-tracking

2

detecting-anomalies-in-industrial-control-systems

2

containing-active-breach

2

managing-intelligence-lifecycle

1

performing-phishing-simulation-with-gophish

1

deploying-cloudflare-access-for-zero-trust

1

implementing-api-security-posture-management

1

monitoring-darkweb-sources

1

securing-aws-lambda-execution-roles

1

implementing-google-workspace-phishing-protection

1

performing-agentless-vulnerability-scanning

1

implementing-network-segmentation-for-ot

1

implementing-vulnerability-remediation-sla

1

building-ioc-defanging-and-sharing-pipeline

1

performing-dns-enumeration-and-zone-transfer

1

hunting-for-spearphishing-indicators

1

mapping-mitre-attack-techniques

1

performing-threat-emulation-with-atomic-red-team

1

building-identity-governance-lifecycle-process

1

performing-service-account-credential-rotation

1

configuring-active-directory-tiered-model

1

implementing-semgrep-for-custom-sast-rules

1

configuring-zscaler-private-access-for-ztna

1

configuring-windows-defender-advanced-settings

1

building-phishing-reporting-button-workflow

1

securing-container-registry-images

1

exploiting-zerologon-vulnerability-cve-2020-1472

1

performing-brand-monitoring-for-impersonation

1

detecting-email-account-compromise

1

building-incident-response-playbook

1

detecting-living-off-the-land-with-lolbas

1

reverse-engineering-ios-app-with-frida

1

implementing-network-intrusion-prevention-with-suricata

1

implementing-google-workspace-admin-security

1

building-ioc-enrichment-pipeline-with-opencti

1

implementing-dragos-platform-for-ot-monitoring

1

detecting-cloud-cryptomining-activity

1

conducting-phishing-incident-response

1

implementing-next-generation-firewall-with-palo-alto

1

configuring-ldap-security-hardening

1

hunting-for-data-staging-before-exfiltration

1

implementing-google-workspace-sso-configuration

1

reverse-engineering-rust-malware

1

performing-privileged-account-access-review

1

scanning-container-images-with-grype

1

securing-serverless-functions

1

detecting-attacks-on-historian-servers

1

implementing-pod-security-admission-controller

1

configuring-network-segmentation-with-vlans

1

implementing-pci-dss-compliance-controls

1

hardening-docker-containers-for-production

1

deploying-edr-agent-with-crowdstrike

1

implementing-network-traffic-baselining

1

configuring-aws-verified-access-for-ztna

1

performing-linux-log-forensics-investigation

1

configuring-tls-1-3-for-secure-communications

1

implementing-mtls-for-zero-trust-services

1

hardening-windows-endpoint-with-cis-benchmark

1

implementing-threat-intelligence-platform

1

securing-remote-access-to-ot-environment

1

performing-hash-cracking-with-hashcat

1

performing-cloud-asset-inventory-with-cartography

1

configuring-suricata-for-network-monitoring

1

implementing-network-access-control-with-cisco-ise

1

performing-api-inventory-and-discovery

1

performing-kerberoasting-attack

1

performing-red-team-with-covenant

1

detecting-anomalous-authentication-patterns

1

performing-cloud-native-forensics-with-falco

1

implementing-web-application-logging-with-modsecurity

1

performing-aws-privilege-escalation-assessment

1

scanning-infrastructure-with-nessus

1

reverse-engineering-malware-with-ghidra

1

detecting-network-scanning-with-ids-signatures

1

hunting-advanced-persistent-threats

1

deobfuscating-javascript-malware

1

implementing-cloud-workload-protection

1

securing-container-registry-with-harbor

1

performing-jwt-none-algorithm-attack

1

performing-privilege-escalation-assessment

1

building-identity-federation-with-saml-azure-ad

1

hunting-for-ntlm-relay-attacks

1

exploiting-ipv6-vulnerabilities

1

exploiting-ms17-010-eternalblue-vulnerability

1

implementing-network-deception-with-honeypots

1

implementing-supply-chain-security-with-in-toto

1

conducting-internal-reconnaissance-with-bloodhound-ce

1

implementing-zero-trust-network-access-with-zscaler

1

scanning-network-with-nmap-advanced

1

implementing-alert-fatigue-reduction

1

exploiting-broken-function-level-authorization

1

performing-cloud-forensics-investigation

1

hunting-for-data-exfiltration-indicators

1

performing-container-security-scanning-with-trivy

1

conducting-internal-network-penetration-test

1

configuring-identity-aware-proxy-with-google-iap

1

performing-active-directory-forest-trust-attack

1

performing-vlan-hopping-attack

1

exploiting-jwt-algorithm-confusion-attack

1

performing-authenticated-scan-with-openvas

1

performing-dynamic-analysis-of-android-app

1

hunting-credential-stuffing-attacks

1

configuring-hsm-for-key-storage

1

building-red-team-c2-infrastructure-with-havoc

1

implementing-zero-standing-privilege-with-cyberark

1

implementing-zero-trust-with-hashicorp-boundary

1

implementing-cloud-waf-rules

1

securing-historian-server-in-ot-environment

1

detecting-modbus-protocol-anomalies

1

implementing-iso-27001-information-security-management

1

deploying-osquery-for-endpoint-monitoring

1

hunting-for-dns-based-persistence

1

configuring-snort-ids-for-intrusion-detection

1

performing-privileged-account-discovery

1

performing-fuzzing-with-aflplusplus

1

building-devsecops-pipeline-with-gitlab-ci

1

implementing-vulnerability-management-with-greenbone

1

implementing-network-policies-for-kubernetes

1

implementing-mitre-attack-coverage-mapping

1

detecting-dns-exfiltration-with-dns-query-analysis

1

performing-graphql-introspection-attack

1

implementing-zero-trust-with-beyondcorp

1

configuring-oauth2-authorization-flow

1

detecting-dcsync-attack-in-active-directory

1

remediating-s3-bucket-misconfiguration

1

scanning-kubernetes-manifests-with-kubesec

1

performing-plc-firmware-security-analysis

1

performing-physical-intrusion-assessment

1

performing-wireless-network-penetration-test

1

implementing-network-access-control

1

performing-ransomware-response

1

performing-endpoint-vulnerability-remediation

1

configuring-certificate-authority-with-openssl

1

evaluating-threat-intelligence-platforms

1

performing-purple-team-exercise

1

securing-azure-with-microsoft-defender

1

performing-dns-tunneling-detection

1

hardening-linux-endpoint-with-cis-benchmark

1

conducting-domain-persistence-with-dcsync

1

performing-clickjacking-attack-test

1

implementing-iec-62443-security-zones

1

configuring-microsegmentation-for-zero-trust

1

implementing-zero-trust-network-access

1

performing-android-app-static-analysis-with-mobsf

1

building-soc-escalation-matrix

1

eradicating-malware-from-infected-systems

1

implementing-zero-trust-in-cloud

1

implementing-mimecast-targeted-attack-protection

1

securing-helm-chart-deployments

1

performing-container-image-hardening

1

implementing-vulnerability-sla-breach-alerting

1

performing-kubernetes-cis-benchmark-with-kube-bench

1

implementing-aws-iam-permission-boundaries

1

performing-red-team-phishing-with-gophish

1

detecting-living-off-the-land-attacks

1

implementing-network-traffic-analysis-with-arkime

1

deploying-software-defined-perimeter

1

performing-steganography-detection

1

detecting-cryptomining-in-cloud

1

detecting-lateral-movement-in-network

1

implementing-cloud-security-posture-management

1

reverse-engineering-android-malware-with-jadx

1

securing-github-actions-workflows

1

implementing-cloud-vulnerability-posture-management

1

implementing-infrastructure-as-code-security-scanning

1

performing-ransomware-incident-response

1

detecting-lateral-movement-with-splunk

1

implementing-zero-knowledge-proof-for-authentication

1

performing-endpoint-forensics-investigation

1

performing-external-network-penetration-test

1

detecting-modbus-command-injection-attacks

1

configuring-host-based-intrusion-detection

1

securing-aws-iam-permissions

1

implementing-zero-trust-dns-with-nextdns

1

configuring-multi-factor-authentication-with-duo

1

implementing-aws-config-rules-for-compliance

1

hunting-for-domain-fronting-c2-traffic

1

hunting-for-webshells-in-web-servers

1

integrating-dast-with-owasp-zap-in-pipeline

1

performing-active-directory-compromise-investigation

1

intercepting-mobile-traffic-with-burpsuite

1

implementing-zero-trust-for-saas-applications

1

performing-cloud-penetration-testing-with-pacu

1

integrating-sast-into-github-actions-pipeline

1

performing-soap-web-service-security-testing

1

configuring-pfsense-firewall-rules

1

implementing-threat-intelligence-lifecycle-management

1

exploiting-kerberoasting-with-impacket

1

hunting-for-supply-chain-compromise

1

exploiting-smb-vulnerabilities-with-metasploit

1

building-incident-response-dashboard

1

building-patch-tuesday-response-process

1

detecting-arp-poisoning-in-network-traffic

1

extracting-iocs-from-malware-samples

1

performing-subdomain-enumeration-with-subfinder

1

implementing-network-segmentation-with-firewall-zones

1

detecting-network-anomalies-with-zeek

1

conducting-spearphishing-simulation-campaign

1

correlating-security-events-in-qradar

1

detecting-email-forwarding-rules-attack

1