New Skills

The latest published additions to the directory, ordered by publish date and secondary hotness signals.

200 skills
M
hunting-advanced-persistent-threats

by mukul975

hunting-advanced-persistent-threats is a threat-hunting skill for detecting APT-style activity across endpoint, network, and memory telemetry. It helps analysts build hypothesis-driven hunts, map findings to MITRE ATT&CK, and turn threat intel into practical queries and investigation steps instead of ad hoc searches.

Threat Hunting
Favorites 0GitHub 0
M
generating-threat-intelligence-reports

by mukul975

The generating-threat-intelligence-reports skill turns analyzed cyber data into strategic, operational, tactical, or flash threat intelligence reports for executives, SOC teams, IR leads, and analysts. It supports finished intelligence, confidence language, TLP handling, and clear recommendations for Report Writing.

Report Writing
Favorites 0GitHub 0
M
extracting-windows-event-logs-artifacts

by mukul975

extracting-windows-event-logs-artifacts helps you extract, parse, and analyze Windows Event Logs (EVTX) for digital forensics, incident response, and threat hunting. It supports structured review of logons, process creation, service installs, scheduled tasks, privilege changes, and log clearing with Chainsaw, Hayabusa, and EvtxECmd.

Digital Forensics
Favorites 0GitHub 0
M
extracting-memory-artifacts-with-rekall

by mukul975

extracting-memory-artifacts-with-rekall guide for analyzing Windows memory images with Rekall. Learn install and usage patterns to find hidden processes, injected code, suspicious VADs, loaded DLLs, and network activity for Digital Forensics.

Digital Forensics
Favorites 0GitHub 0
M
extracting-credentials-from-memory-dump

by mukul975

The extracting-credentials-from-memory-dump skill helps analyze Windows memory dumps for NTLM hashes, LSA secrets, Kerberos material, and tokens using Volatility 3 and pypykatz workflows. It is built for Digital Forensics and incident response when you need defensible evidence, account impact, and remediation guidance from a valid dump.

Digital Forensics
Favorites 0GitHub 0
M
extracting-iocs-from-malware-samples

by mukul975

extracting-iocs-from-malware-samples skill guide for malware analysis: extract hashes, IPs, domains, URLs, host artifacts, and validation cues from samples for threat intel and detection.

Malware Analysis
Favorites 0GitHub 0
M
extracting-config-from-agent-tesla-rat

by mukul975

extracting-config-from-agent-tesla-rat skill for Malware Analysis: extract Agent Tesla .NET config, SMTP/FTP/Telegram credentials, keylogger settings, and C2 endpoints with repeatable workflow guidance.

Malware Analysis
Favorites 0GitHub 0
M
extracting-browser-history-artifacts

by mukul975

extracting-browser-history-artifacts is a Digital Forensics skill for extracting browser history, cookies, cache, downloads, and bookmarks from Chrome, Firefox, and Edge. Use it to turn browser profile files into timeline-ready evidence with repeatable, case-focused workflow guidance.

Digital Forensics
Favorites 0GitHub 0
M
exploiting-server-side-request-forgery

by mukul975

The exploiting-server-side-request-forgery skill helps assess SSRF-prone features in authorized web targets, including URL fetchers, webhooks, preview tools, and cloud metadata access. It provides a guided workflow for detection, bypass testing, internal service probing, and Security Audit validation.

Security Audit
Favorites 0GitHub 0
M
exploiting-race-condition-vulnerabilities

by mukul975

The exploiting-race-condition-vulnerabilities skill helps security auditors test web apps for TOCTOU flaws, duplicate transactions, and limit bypasses using Turbo Intruder-style concurrent requests. It includes install, workflow, and usage guidance for authorized assessments.

Security Audit
Favorites 0GitHub 0
M
exploiting-nopac-cve-2021-42278-42287

by mukul975

The exploiting-nopac-cve-2021-42278-42287 skill is a practical guide for assessing the noPac chain (CVE-2021-42278 and CVE-2021-42287) in Active Directory. It helps authorized red teamers and Security Audit users check prerequisites, review workflow files, and document exploitability with less guesswork.

Security Audit
Favorites 0GitHub 0
M
exploiting-kerberoasting-with-impacket

by mukul975

exploiting-kerberoasting-with-impacket helps authorized testers plan Kerberoasting with Impacket GetUserSPNs.py, from SPN enumeration to TGS ticket extraction, offline cracking, and detection-aware reporting. Use this exploiting-kerberoasting-with-impacket guide for penetration testing workflows with clear install and usage context.

Penetration Testing
Favorites 0GitHub 6.2k
M
exploiting-jwt-algorithm-confusion-attack

by mukul975

The exploiting-jwt-algorithm-confusion-attack skill helps Security Audit workflows test JWT algorithm confusion, including RS256-to-HS256 downgrades, alg:none bypasses, and kid/jku/x5u header tricks. It is backed by a practical guide, reference examples, and a script for repeatable validation.

Security Audit
Favorites 0GitHub 6.2k
M
exploiting-insecure-data-storage-in-mobile

by mukul975

The exploiting-insecure-data-storage-in-mobile skill helps assess and extract evidence from insecure local storage in Android and iOS apps. It covers SharedPreferences, SQLite databases, plist files, world-readable files, backup exposure, and weak keychain/keystore handling for mobile pentesting and Security Audit workflows.

Security Audit
Favorites 0GitHub 6.2k
M
exploiting-idor-vulnerabilities

by mukul975

exploiting-idor-vulnerabilities helps authorized security audits test Insecure Direct Object Reference flaws across APIs, web apps, and multi-tenant systems with cross-session checks, object mapping, and read/write verification.

Security Audit
Favorites 0GitHub 6.2k
M
exploiting-excessive-data-exposure-in-api

by mukul975

exploiting-excessive-data-exposure-in-api helps security audit teams inspect API responses for over-shared fields, including PII, secrets, internal IDs, and debug data. It provides a focused workflow, reference patterns, and analyzer logic for comparing returned data against expected schema and roles.

Security Audit
Favorites 0GitHub 0
M
exploiting-constrained-delegation-abuse

by mukul975

The exploiting-constrained-delegation-abuse skill guides authorized Active Directory testing of Kerberos constrained delegation abuse. It covers enumeration, S4U2self and S4U2proxy ticket requests, and practical paths to lateral movement or privilege escalation. Use it when you need a repeatable guide for penetration testing, not a generic Kerberos overview.

Penetration Testing
Favorites 0GitHub 0
M
exploiting-api-injection-vulnerabilities

by mukul975

exploiting-api-injection-vulnerabilities skill for Security Audit teams testing APIs for SQL injection, NoSQL injection, command injection, LDAP injection, and SSRF across parameters, headers, and request bodies. This guide helps you spot risky inputs, compare baseline responses, and validate whether backend interactions are injectable.

Security Audit
Favorites 0GitHub 0
M
executing-red-team-exercise

by mukul975

executing-red-team-exercise is a cybersecurity skill for planning and tracking realistic red team exercises. It supports adversary emulation across reconnaissance, technique selection, execution, and detection-gap review, making it useful for Security Audit work and ATT&CK-aligned assessments.

Security Audit
Favorites 0GitHub 0
M
evaluating-threat-intelligence-platforms

by mukul975

evaluating-threat-intelligence-platforms helps you compare TIP products by feed ingestion, STIX/TAXII support, automation, analyst workflow, integrations, and total cost of ownership. Use this evaluating-threat-intelligence-platforms guide for procurement, migration, or maturity planning, including evaluating-threat-intelligence-platforms for Threat Modeling when platform choice affects traceability and evidence sharing.

Threat Modeling
Favorites 0GitHub 0
M
eradicating-malware-from-infected-systems

by mukul975

eradicating-malware-from-infected-systems is a cybersecurity incident response skill for removing malware, backdoors, and persistence mechanisms after containment. It includes workflow guidance, reference files, and scripts for Windows and Linux cleanup, credential rotation, root-cause remediation, and validation.

Incident Response
Favorites 0GitHub 0
M
detecting-wmi-persistence

by mukul975

The detecting-wmi-persistence skill helps threat hunters and DFIR analysts detect WMI event subscription persistence in Windows telemetry using Sysmon Event IDs 19, 20, and 21. Use it to identify malicious EventFilter, EventConsumer, and FilterToConsumerBinding activity, validate findings, and separate attacker persistence from benign admin automation.

Threat Hunting
Favorites 0GitHub 0
M
detecting-supply-chain-attacks-in-ci-cd

by mukul975

detecting-supply-chain-attacks-in-ci-cd skill for auditing GitHub Actions and CI/CD configs. It helps find unpinned actions, script injection, dependency confusion, secret exposure, and risky permissions for Security Audit workflows. Use it to review a repo, workflow file, or suspicious pipeline change with clear findings and fixes.

Security Audit
Favorites 0GitHub 0
M
detecting-stuxnet-style-attacks

by mukul975

The detecting-stuxnet-style-attacks skill helps defenders detect Stuxnet-like OT and ICS intrusion patterns, including PLC logic tampering, spoofed sensor data, engineering workstation compromise, and IT-to-OT lateral movement. Use it for threat hunting, incident triage, and process-integrity monitoring with protocol, host, and process evidence.

Threat Hunting
Favorites 0GitHub 0

How to use the new agent skills page

This page is built for people searching for new agent skills, latest agent skills, and recently added workflows that may not have broad traction yet.

Track recent additions

New agent skills are ordered by publish date first, making it easier to spot what was added most recently.

Catch emerging workflows early

Use this page when you want fresh ideas, experimental workflows, or newly added skills that might not appear in hot rankings yet.

Continue into category pages

After finding an interesting new skill, open its category page to compare it with similar skills solving the same problem.

Questions about new agent skills

These answers explain how the new page differs from the homepage and hot page.

Use new skills to discover what is changing

Browse the newest additions first, then compare them against hot skills and category pages to decide what deserves your time.