If you find vskill useful, give it a star on GitHub
← All publishers
── mukul975 ────────────────────────────────────────
517 skillsAvg Trust: 613.8k total stars
Repositories (3)
mukul975/anthropic-cybersecurity-skills3.7k stars233 skillsmukul975/privacy-data-protection-skills37 stars283 skillsmukul975/cyber-skills22 stars1 skill
517 skills
analyzing-ransomware-leak-site-intelligence
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 693.7k starsmukul975/anthropic-cybersecurity-skillsv1.0.09d ago
hunting-for-registry-persistence-mechanisms
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 693.7k starsmukul975/anthropic-cybersecurity-skillsv1.0.09d ago
performing-container-escape-detection
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 673.7k starsmukul975/anthropic-cybersecurity-skillsv1.0.09d ago
performing-threat-modeling-with-owasp-threat-dragon
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 693.7k starsmukul975/anthropic-cybersecurity-skillsv1.0.09d ago
performing-aws-privilege-escalation-assessment
VERIFIED
mukul975/Anthropic-Cybersecurity-Skills
Trust: 703.6k starsmukul975/anthropic-cybersecurity-skillsv1.0.014d ago
detecting-modbus-command-injection-attacks
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 673.6k starsmukul975/anthropic-cybersecurity-skillsv1.0.015d ago
building-incident-timeline-with-timesketch
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.5k starsmukul975/anthropic-cybersecurity-skillsv1.0.016d ago
configuring-aws-verified-access-for-ztna
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.5k starsmukul975/anthropic-cybersecurity-skillsv1.0.016d ago
analyzing-malicious-pdf-with-peepdf
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-malware-sandbox-evasion-techniques
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-supply-chain-malware-artifacts
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-tls-certificate-transparency-logs
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-typosquatting-domains-with-dnstwist
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
auditing-aws-s3-bucket-permissions
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 673.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-golang-malware-with-ghidra
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-docker-container-forensics
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 403.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
analyzing-linux-audit-logs-for-intrusion
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 693.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
deobfuscating-powershell-obfuscated-malware
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 693.2k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
conducting-external-reconnaissance-with-osint
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 673.2k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
exploiting-bgp-hijacking-vulnerabilities
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 673.2k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-malicious-url-with-urlscan
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 703.1k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
building-detection-rule-with-splunk-spl
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 102.5k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-memory-forensics-with-lime-and-volatility
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 702.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-windows-prefetch-with-python
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 702.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
exploiting-idor-vulnerabilities
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 662.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
collecting-threat-intelligence-with-misp
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 692.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-lnk-file-and-jump-list-artifacts
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 702.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
analyzing-ios-app-security-with-objection
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 102.3k starsmukul975/anthropic-cybersecurity-skillsv1.0.017d ago
conducting-mobile-app-penetration-testSemi-Ext
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 401.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.018d ago
performing-kubernetes-penetration-testing
VERIFIED
mukul975/anthropic-cybersecurity-skills
Trust: 401.4k starsmukul975/anthropic-cybersecurity-skillsv1.0.016d ago