← All publishers
── mukul975 ────────────────────────────────────────
517 skillsAvg Trust: 613.8k total stars
Repositories (3)
517 skills
analyzing-ransomware-leak-site-intelligence
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 693.7k starsmukul975/anthropic-cybersecurity-skillsv1.0.09d ago
hunting-for-registry-persistence-mechanisms
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 693.7k starsmukul975/anthropic-cybersecurity-skillsv1.0.09d ago
performing-container-escape-detection
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 673.7k starsmukul975/anthropic-cybersecurity-skillsv1.0.09d ago
performing-threat-modeling-with-owasp-threat-dragon
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 693.7k starsmukul975/anthropic-cybersecurity-skillsv1.0.09d ago
performing-aws-privilege-escalation-assessment
VERIFIEDmukul975/Anthropic-Cybersecurity-Skills
Trust: 703.6k starsmukul975/anthropic-cybersecurity-skillsv1.0.014d ago
detecting-modbus-command-injection-attacks
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 673.6k starsmukul975/anthropic-cybersecurity-skillsv1.0.015d ago
building-incident-timeline-with-timesketch
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.5k starsmukul975/anthropic-cybersecurity-skillsv1.0.016d ago
configuring-aws-verified-access-for-ztna
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.5k starsmukul975/anthropic-cybersecurity-skillsv1.0.016d ago
analyzing-malicious-pdf-with-peepdf
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-malware-sandbox-evasion-techniques
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-supply-chain-malware-artifacts
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-tls-certificate-transparency-logs
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-typosquatting-domains-with-dnstwist
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
auditing-aws-s3-bucket-permissions
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 673.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-golang-malware-with-ghidra
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-docker-container-forensics
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 403.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-linux-audit-logs-for-intrusion
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 693.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
deobfuscating-powershell-obfuscated-malware
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 693.2k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
conducting-external-reconnaissance-with-osint
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 673.2k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
exploiting-bgp-hijacking-vulnerabilities
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 673.2k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-malicious-url-with-urlscan
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 703.1k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
building-detection-rule-with-splunk-spl
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 102.5k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-memory-forensics-with-lime-and-volatility
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 702.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-windows-prefetch-with-python
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 702.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
exploiting-idor-vulnerabilities
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 662.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
collecting-threat-intelligence-with-misp
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 692.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-lnk-file-and-jump-list-artifacts
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 702.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-ios-app-security-with-objection
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 102.3k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
conducting-mobile-app-penetration-testSemi-Ext
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 401.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
performing-kubernetes-penetration-testing
VERIFIEDmukul975/anthropic-cybersecurity-skills
Trust: 401.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.016d ago