Descubre Habilidades de Claude para security & testing. Explora 105 habilidades y encuentra las capacidades perfectas para tus flujos de trabajo de IA.
Identifies and analyzes lateral movement patterns in network traffic by parsing Zeek logs for SMB, RPC, and NTLM activity.
Identifies unauthorized data movement by analyzing DLP logs and user behavior patterns using statistical anomaly detection.
Deploys and configures high-performance Suricata IDS/IPS for real-time network traffic inspection and threat detection.
Implements a multi-factor scoring model to prioritize vulnerability remediation based on business impact and data sensitivity.
Enforces mandatory technical verification and user confirmation protocols to eliminate false AI success claims and hallucinated progress reports.
Secures microservices and APIs by implementing centralized gateway controls including authentication, rate limiting, and threat protection.
Implements secure, multi-tenant role-based access control and hierarchical permissions for enterprise Gamma integrations.
Conducts comprehensive cloud security audits across AWS, Azure, and GCP using industry-standard CIS Foundations Benchmarks.
Monitors and detects unauthorized write operations, anomalous function codes, and command injection attacks against Modbus TCP/RTU protocols in industrial environments.
Detects runtime threats and performs forensic analysis in Kubernetes and containerized environments using Falco security rules.
Conducts comprehensive cybersecurity maturity assessments using the NIST CSF 2.0 framework to evaluate risk posture and create strategic improvement roadmaps.
Implements secure end-to-end encryption for messaging using the Signal Protocol, Double Ratchet algorithm, and AES-256-GCM.
Detects and eliminates codebase bloat, redundant documentation, and unused dependencies through progressive static and history analysis.
Standardizes authentication flows for external APIs using API keys, OAuth, and token management within Claude Code environments.
Automates security log auditing and threat detection to identify vulnerabilities and ensure regulatory compliance within the terminal.
Automates the deployment, execution, and reporting of network vulnerability scans using Greenbone OpenVAS and the python-gvm library.
Configures and validates TLS 1.3 protocols to enhance server security and network performance while eliminating legacy vulnerabilities.
Conducts structured threat modeling and secure design reviews using OWASP Threat Dragon and industry-standard methodologies like STRIDE and LINDDUN.
Automates SOC2 compliance auditing and security control validation for software infrastructure and development workflows.
Detects and analyzes registry-based persistence mechanisms in Windows environments to identify potential security compromises.
Verifies Clerk authentication integration by setting up protected routes and performing initial authenticated requests.
Automates MITRE ATT&CK security validation using Atomic Red Team tests and the atomic-operator framework.
Performs automated security audits on Solidity smart contracts using static analysis and symbolic execution to identify critical vulnerabilities.
Detects and prevents ARP spoofing attacks using automated monitoring tools and network security configurations to protect against man-in-the-middle interceptions.
Implements robust security protocols and PII protection for Langfuse LLM observability integrations.
Detects and remediates insecure deserialization vulnerabilities by providing automated security checks and secure coding patterns.
Identifies and exploits XML External Entity (XXE) vulnerabilities to detect server-side file access, SSRF, and data exfiltration.
Deploys DNS, HTTP, and AWS API key canary tokens to detect unauthorized network access and lateral movement with zero-false-positive alerts.
Performs interactive dynamic malware analysis using the ANY.RUN cloud sandbox to observe real-time execution behavior and capture indicators of compromise.
Detects indicators of Business Email Compromise (BEC) by parsing Microsoft Office 365 Unified Audit Logs via the Graph API.
Scroll for more results...