TLS 1.3 (RFC 8446) is the latest version of the Transport Layer Security protocol, providing significant improvements
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →TLS 1.3 (RFC 8446) is the latest version of the Transport Layer Security protocol, providing significant improvements
'Configures Microsoft Defender for Endpoint (MDE) advanced protection settings including attack surface reduction
'Configures Windows Event Logging with advanced audit policies to generate high-fidelity security events for
'Configuring Zscaler Private Access (ZPA) to replace traditional VPN with zero trust network access by deploying
'Executes containment strategies to stop active adversary operations and prevent lateral movement during a confirmed
'Correlates security events in IBM QRadar SIEM using AQL (Ariel Query Language), custom rules, building blocks,
'Correlates disparate security incidents, IOCs, and adversary behaviors across time and organizations to identify
'Deobfuscates malicious JavaScript code used in web-based attacks, phishing pages, and dropper scripts by reversing
Systematically deobfuscate multi-layer PowerShell malware using AST analysis, dynamic tracing, and tools like
'Deploys deception-based honeytokens in Active Directory including fake privileged accounts with AdminCount=1,
'Deploying Cloudflare Access with Cloudflare Tunnel to provide zero trust access to self-hosted and private applications,
'Deploys canary files (honeytokens) across file systems to detect ransomware encryption activity in real time.
'Deploys and configures CrowdStrike Falcon EDR agents across enterprise endpoints to enable real-time threat
'Deploys and configures osquery for real-time endpoint monitoring using SQL-based queries to inspect running
'Deploying Palo Alto Networks Prisma Access for SASE-based zero trust network access using GlobalProtect agents,
'Deploys and monitors ransomware canary files across critical directories using Python''s watchdog library for
Deploy a Software-Defined Perimeter using the CSA v2.0 specification with Single Packet Authorization, mutual
Deploy and configure Tailscale as a WireGuard-based zero trust mesh VPN with identity-aware access controls,
'Detects prompt injection attacks targeting LLM-based applications using a multi-layered defense combining regex
'This skill covers deploying anomaly detection systems for industrial control environments using machine learning
'Detects anomalous authentication patterns using UEBA analytics, statistical baselines, and machine learning
Detect and prevent API enumeration attacks including BOLA and IDOR exploitation by monitoring sequential identifier
Detect and prevent ARP spoofing attacks using ARPWatch, Dynamic ARP Inspection, Wireshark analysis, and custom
'Detect cyber attacks targeting OT historian servers (OSIsoft PI, Ignition, Wonderware) that sit at the IT/OT
'This skill covers detecting cyber attacks targeting Supervisory Control and Data Acquisition (SCADA) systems
Detect unusual API call patterns in AWS CloudTrail logs using boto3, statistical baselining, and behavioral analysis
'Detecting exposed AWS credentials in source code repositories, CI/CD pipelines, and configuration files using
Automate AWS GuardDuty threat detection findings processing using EventBridge and Lambda to enable real-time
Detect AWS IAM privilege escalation paths using boto3 and Cloudsplaining policy analysis to identify overly permissive
Detect lateral movement in Azure AD/Entra ID environments using Microsoft Graph API audit logs, Azure Sentinel
Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin
Audit Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing
'Performs statistical analysis of Zeek conn.log connection intervals to detect C2 beaconing patterns. Uses the
'Detects and analyzes Bluetooth Low Energy (BLE) security attacks including sniffing, replay attacks, GATT enumeration
Detect and test for OWASP API3:2023 Broken Object Property Level Authorization vulnerabilities including excessive
Deploy AI and NLP-powered detection systems to identify business email compromise attacks by analyzing writing
Business Email Compromise (BEC) is a sophisticated fraud scheme where attackers impersonate executives, vendors,
'This skill teaches security teams how to deploy and operationalize Amazon GuardDuty for continuous threat detection
'Detects command-and-control (C2) communications tunneled through DNS protocol including DNS tunneling tools
'Detecting compromised cloud credentials across AWS, Azure, and GCP by analyzing anomalous API activity, impossible
Detect unauthorized modifications to running containers by monitoring for binary execution drift, file system
Container escape is a critical attack technique where an adversary breaks out of container isolation to access
Detect container escape attempts in real-time using Falco runtime security rules that monitor syscalls, file
Detect LSASS credential dumping, SAM database extraction, and NTDS.dit theft using Sysmon Event ID 10, Windows
'This skill teaches security teams how to detect and respond to unauthorized cryptocurrency mining operations
Detect DCSync attacks where adversaries abuse Active Directory replication privileges to extract password hashes
'Detects AI-generated deepfake audio used in voice phishing (vishing) attacks by extracting spectral features
Detect DLL side-loading attacks where adversaries place malicious DLLs alongside legitimate applications to hijack
'Detect anomalies in DNP3 (Distributed Network Protocol 3) communications used in SCADA systems by monitoring
Detect data exfiltration through DNS tunneling by analyzing query entropy, subdomain length, query volume, TXT