Discover and install skills, docs, and rules to enhance your AI agent's capabilities.
| Name | Contains | Score |
|---|---|---|
analyzing-bootkit-and-rootkit-samples mukul975/Anthropic-Cybersecurity-Skills Analyzes bootkit and advanced rootkit malware that infects the Master Boot Record (MBR), Volume Boot Record (VBR), or UEFI firmware to gain persistence below the operating system. Covers boot sector analysis, UEFI module inspection, and anti-rootkit detection techniques. Activates for requests involving bootkit analysis, MBR malware investigation, UEFI persistence analysis, or pre-OS malware detection. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: d388b31 |
analyzing-indicators-of-compromise mukul975/Anthropic-Cybersecurity-Skills Analyzes indicators of compromise (IOCs) including IP addresses, domains, file hashes, URLs, and email artifacts to determine maliciousness confidence, campaign attribution, and blocking priority. Use when triaging IOCs from phishing emails, security alerts, or external threat feeds; enriching raw IOCs with multi-source intelligence; or making block/monitor/whitelist decisions. Activates for requests involving VirusTotal, AbuseIPDB, MalwareBazaar, MISP, or IOC enrichment pipelines. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: d388b31 |
analyzing-windows-amcache-artifacts mukul975/Anthropic-Cybersecurity-Skills Parses and analyzes the Windows Amcache.hve registry hive to extract evidence of program execution, application installation, and driver loading for digital forensics investigations. Uses Eric Zimmerman's AmcacheParser and Timeline Explorer for artifact extraction, SHA-1 hash correlation with threat intel, and timeline reconstruction. Activates for requests involving Amcache forensics, program execution evidence, Windows artifact analysis, or application compatibility cache investigation. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: d388b31 |
analyzing-macro-malware-in-office-documents mukul975/Anthropic-Cybersecurity-Skills Analyzes malicious VBA macros embedded in Microsoft Office documents (Word, Excel, PowerPoint) to identify download cradles, payload execution, persistence mechanisms, and anti-analysis techniques. Uses olevba, oledump, and VBA deobfuscation to extract the attack chain. Activates for requests involving Office macro analysis, VBA malware investigation, maldoc analysis, or document-based threat examination. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: d388b31 |
analyzing-linux-audit-logs-for-intrusion mukul975/Anthropic-Cybersecurity-Skills Uses the Linux Audit framework (auditd) with ausearch and aureport utilities to detect intrusion attempts, unauthorized access, privilege escalation, and suspicious system activity. Covers audit rule configuration, log querying, timeline reconstruction, and integration with SIEM platforms. Activates for requests involving auditd analysis, Linux audit log investigation, ausearch queries, aureport summaries, or host-based intrusion detection on Linux. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 888bbe4 |
experiment-plan wanshuiyin/Auto-claude-code-research-in-sleep Turn a refined research proposal or method idea into a detailed, claim-driven experiment roadmap. Use after `research-refine`, or when the user asks for a detailed experiment plan, ablation matrix, evaluation protocol, run order, compute budget, or paper-ready validation that supports the core problem, novelty, simplicity, and any LLM / VLM / Diffusion / RL-based contribution. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 391bda8 |
analyzing-ransomware-encryption-mechanisms mukul975/Anthropic-Cybersecurity-Skills Analyzes encryption algorithms, key management, and file encryption routines used by ransomware families to assess decryption feasibility, identify implementation weaknesses, and support recovery efforts. Covers AES, RSA, ChaCha20, and hybrid encryption schemes. Activates for requests involving ransomware cryptanalysis, encryption analysis, key recovery assessment, or ransomware decryption feasibility. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: efbbbba |
analyzing-memory-dumps-with-volatility mukul975/Anthropic-Cybersecurity-Skills Analyzes RAM memory dumps from compromised systems using the Volatility framework to identify malicious processes, injected code, network connections, loaded modules, and extracted credentials. Supports Windows, Linux, and macOS memory forensics. Activates for requests involving memory forensics, RAM analysis, volatile data examination, process injection detection, or memory-resident malware investigation. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Risky Do not use without reviewing Reviewed: Version: d388b31 |
idea-discovery wanshuiyin/Auto-claude-code-research-in-sleep Workflow 1: Full idea discovery pipeline. Orchestrates research-lit → idea-creator → novelty-check → research-review to go from a broad research direction to validated, pilot-tested ideas. Use when user says \"找idea全流程\", \"idea discovery pipeline\", \"从零开始找方向\", or wants the complete idea exploration workflow. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 9ed83e0 |
idea-creator wanshuiyin/Auto-claude-code-research-in-sleep Generate and rank research ideas given a broad direction. Use when user says "找idea", "brainstorm ideas", "generate research ideas", "what can we work on", or wants to explore a research area for publishable directions. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: bc8a7bc |
auto-review-loop wanshuiyin/Auto-claude-code-research-in-sleep Autonomous multi-round research review loop. Repeatedly reviews using Claude Code via claude-review MCP, implements fixes, and re-reviews until positive assessment or max rounds reached. Use when user says "auto review loop", "review until it passes", or wants autonomous iterative improvement. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 700fbe2 |
auto-paper-improvement-loop wanshuiyin/Auto-claude-code-research-in-sleep Autonomously improve a generated paper via GPT-5.4 xhigh review → implement fixes → recompile, for 2 rounds. Use when user says "改论文", "improve paper", "论文润色循环", "auto improve", or wants to iteratively polish a generated paper. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 97e0eb1 |
auto-review-loop wanshuiyin/Auto-claude-code-research-in-sleep Autonomous multi-round research review loop. Repeatedly reviews using a secondary Codex agent, implements fixes, and re-reviews until positive assessment or max rounds reached. Use when user says "auto review loop", "review until it passes", or wants autonomous iterative improvement. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: dc00dfb |
paper-compile wanshuiyin/Auto-claude-code-research-in-sleep Compile LaTeX paper to PDF, fix errors, and verify output. Use when user says \"编译论文\", \"compile paper\", \"build PDF\", \"生成PDF\", or wants to compile LaTeX into a submission-ready PDF. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 5f3df55 |
feishu-notify wanshuiyin/Auto-claude-code-research-in-sleep Send notifications to Feishu/Lark. Internal utility used by other skills, or manually via /feishu-notify. Supports push-only (webhook) and interactive (bidirectional) modes. Use when user says \"发飞书\", \"notify feishu\", or other skills need to send status updates. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 62e3777 |
experiment-plan wanshuiyin/Auto-claude-code-research-in-sleep Turn a refined research proposal or method idea into a detailed, claim-driven experiment roadmap. Use after `research-refine`, or when the user asks for a detailed experiment plan, ablation matrix, evaluation protocol, run order, compute budget, or paper-ready validation that supports the core problem, novelty, simplicity, and any LLM / VLM / Diffusion / RL-based contribution. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Critical Do not install without reviewing Reviewed: Version: dc00dfb |
auto-paper-improvement-loop wanshuiyin/Auto-claude-code-research-in-sleep Autonomously improve a generated paper via Gemini review through gemini-review MCP → implement fixes → recompile, for 2 rounds. Use when user says "改论文", "improve paper", "论文润色循环", "auto improve", or wants to iteratively polish a generated paper. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: 700fbe2 |
experiment-bridge wanshuiyin/Auto-claude-code-research-in-sleep Workflow 1.5: Bridge between idea discovery and auto review. Reads EXPERIMENT_PLAN.md, implements experiment code, deploys to GPU, collects initial results. Use when user says "实现实验", "implement experiments", "bridge", "从计划到跑实验", "deploy the plan", or has an experiment plan ready to execute. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Advisory Suggest reviewing before use Reviewed: Version: 700fbe2 |
paper-writing wanshuiyin/Auto-claude-code-research-in-sleep Workflow 3: Full paper writing pipeline. Orchestrates paper-plan → paper-figure → paper-write → paper-compile → auto-paper-improvement-loop to go from a narrative report to a polished, submission-ready PDF. Use when user says \"写论文全流程\", \"write paper pipeline\", \"从报告到PDF\", \"paper writing\", or wants the complete paper generation workflow. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Critical Do not install without reviewing Reviewed: Version: bc8a7bc |
dse-loop wanshuiyin/Auto-claude-code-research-in-sleep Autonomous design space exploration loop for computer architecture and EDA. Runs a program, analyzes results, tunes parameters, and iterates until objective is met or timeout. Use when user says \"DSE\", \"design space exploration\", \"sweep parameters\", \"optimize\", \"find best config\", or wants iterative parameter tuning. | Skills | 90 Impact — Average score across 0 eval scenarios Securityby Passed No known issues Reviewed: Version: bc8a7bc |
Can't find what you're looking for? Evaluate a missing skill.