Claude Code Skills·Claude Skills·The open SKILL.md registry for Claude
ClaudSkillsAuthors › mukul975

mukul975

@mukul975 on GitHub →

30 Claude Code skills authored by mukul975.

updated 2026-05-23 · showing 1–30 of 30 by quality score

Average Pro QualityScore: 79.5/100

For the full experience including quality scoring and one-click install features for each skill — upgrade to Pro.

Detect NTLM relay attacks through Windows Security Event correlation by analyzing Event 4624 LogonType 3 for
Implements Sigstore-based software signing and verification using Cosign keyless signing, Rekor transparency
Detects and analyzes Bluetooth Low Energy (BLE) security attacks including sniffing, replay attacks, GATT enumeration
Parses Software Bill of Materials (SBOM) in CycloneDX and SPDX JSON formats to identify supply chain vulnerabilities
Uses AWS Athena to query CloudTrail, VPC Flow Logs, S3 access logs, and ALB logs for forensic investigation.
Monitors Certificate Transparency (CT) logs to detect unauthorized certificate issuance, discover subdomains
Deploys deception-based honeytokens in Active Directory including fake privileged accounts with AdminCount=1,
Detects AI-generated deepfake audio used in voice phishing (vishing) attacks by extracting spectral features
Automates the Privacy Impact Assessment (PIA) workflow including data flow mapping, privacy risk scoring matrices,
Deploys DNS, HTTP, and AWS API key canary tokens across network infrastructure to detect unauthorized access
Implements AWS Nitro Enclave-based confidential computing environments with cryptographic attestation, KMS policy
Detects typosquatting attacks in npm and PyPI package registries by analyzing package name similarity using
Performs comprehensive iOS application security assessments using Frida for dynamic instrumentation, Objection
Implements eBPF-based security monitoring using Cilium Tetragon for real-time process execution tracking, network
Automates GDPR Data Subject Access Request (DSAR) workflows including identity verification, PII discovery across
Detects command-and-control (C2) communications tunneled through DNS protocol including DNS tunneling tools
Assesses organizational readiness for post-quantum cryptography migration per NIST FIPS 203/204/205 standards.
Detects prompt injection attacks targeting LLM-based applications using a multi-layered defense combining regex
Implements input and output validation guardrails for LLM-powered applications to prevent prompt injection,
Implements external attack surface management (EASM) using Shodan, Censys, and ProjectDiscovery tools (subfinder,
Implements FIDO2/WebAuthn hardware security key authentication including registration ceremonies, authentication
Monitors Modbus TCP traffic on SCADA and ICS networks to detect anomalous function code usage, unauthorized
Hunt for DCOM-based lateral movement by detecting abuse of MMC20.Application, ShellBrowserWindow, and ShellWindows
Executes Atomic Red Team tests mapped to MITRE ATT&CK techniques, performs coverage gap analysis across the
Automates SOC 2 Type II audit preparation including gap assessment against AICPA Trust Services Criteria (CC1-CC9),
Implements data loss prevention policies using Microsoft Purview to protect sensitive information across Exchange
Analyzes UEFI bootkit persistence mechanisms including firmware implants in SPI flash, EFI System Partition
Detects and prevents code injection attacks targeting serverless functions (AWS Lambda, Azure Functions, Google
Deploys remote browser isolation (RBI) as a core component of a Zero Trust architecture. Implements isolation
Performs firmware image extraction and analysis using binwalk to identify embedded filesystems, compressed archives,
Search all 30 skills by mukul975 →