Discover and install skills, docs, and rules to enhance your AI agent's capabilities.
| Name | Contains | Score |
|---|---|---|
hunt-threat dandye/ai-runbooks Conduct proactive, hypothesis-driven threat hunting. Use when performing advanced hunting based on threat intelligence, TTPs, or anomalies. For Tier 3 analysts or dedicated threat hunters. Supports iterative search, pivoting, and comprehensive documentation. | Skills | |
hunt-lateral-movement dandye/ai-runbooks Hunt for lateral movement using PsExec, WMI, or similar techniques. Use when proactively searching for attackers moving through your network using admin tools. Searches for service installations, remote process execution, and suspicious network correlations. | Skills | |
hunt-ioc dandye/ai-runbooks Hunt for specific IOCs across your environment. Use when you have a list of IPs, domains, hashes, or URLs from threat intel and want to check if they appear in your SIEM. Systematic searching with enrichment and documentation. | Skills | |
hunt-credential-access dandye/ai-runbooks Hunt for credential access techniques like LSASS dumping or browser credential theft. Use when searching for evidence of credential harvesting. Takes MITRE technique IDs and searches for behavioral indicators in SIEM. | Skills | |
hunt-apt dandye/ai-runbooks Hunt for a specific APT/threat actor in your environment. Use when you have a threat actor name or GTI collection ID and want to search for their TTPs and IOCs. Gathers intelligence from GTI, searches SIEM for IOCs and TTP-based indicators, and documents findings. | Skills | |
generate-thesaurus dandye/ai-runbooks Generate controlled vocabulary thesaurus for content domains. Creates comprehensive thesauri with preferred terms, broader/narrower/related terms. | Skills | |
generate-taxonomy dandye/ai-runbooks Develop hierarchical classification systems. Creates parent-child categorical structures for content organization. | Skills | |
generate-sitemap dandye/ai-runbooks Generate hierarchical site structure and navigation maps. Creates visual representations of information architecture and content relationships. | Skills | |
generate-report dandye/ai-runbooks Save investigation findings to a markdown report file. Use after completing triage, enrichment, or investigation to create a permanent record. Generates timestamped files in ./reports/ directory. | Skills | |
find-relevant-case dandye/ai-runbooks Search for existing cases related to specific indicators or entities. Use to find correlation with other investigations before starting new analysis. Takes search terms and returns matching case IDs. | Skills | |
enrich-ioc dandye/ai-runbooks Enrich an IOC (IP, domain, hash, URL) with threat intelligence. Use when you need to look up reputation and context for an indicator using GTI and SIEM. Returns threat intel findings, SIEM entity summary, and IOC match status. | Skills | |
document-in-case dandye/ai-runbooks Add a comment to a case to document findings, actions, or recommendations. Use to maintain audit trail during investigations. Requires CASE_ID and comment text. | Skills | |
design-metadata-schema dandye/ai-runbooks Design comprehensive metadata frameworks. Develops structured metadata templates and tagging systems. | Skills | |
deep-dive-ioc dandye/ai-runbooks Perform exhaustive analysis of a critical IOC. Use when an IOC needs Tier 2+ investigation beyond basic enrichment - includes GTI pivoting, deep SIEM searches, correlation with related entities, and threat attribution. For escalated IOCs requiring comprehensive investigation. | Skills | |
correlate-ioc dandye/ai-runbooks Check for existing SIEM alerts and case management entries related to IOCs. Use to understand if an indicator has triggered previous alerts or is part of ongoing investigations. Takes IOC list and returns related alerts and cases. | Skills | |
confirm-action dandye/ai-runbooks Ask the user to confirm before taking a significant action. Use before containment, remediation, or other impactful operations to ensure analyst approval. Presents options and waits for response. | Skills | |
cluster-documents dandye/ai-runbooks Automated content similarity and grouping analysis. Groups related documents by topic, purpose, or content similarity. | Skills | |
close-case-artifact dandye/ai-runbooks Close a case or alert with proper reason and documentation. Use when triage determines an alert is FP/BTP or investigation is complete. Requires artifact ID, type, closure reason, and root cause. | Skills | |
check-duplicates dandye/ai-runbooks Check for duplicate or similar cases. Use before deep analysis to avoid investigating the same incident twice. Takes a CASE_ID and returns list of similar cases. | Skills | |
audit-content dandye/ai-runbooks Comprehensive content quality and maintenance assessment. Evaluates documentation quality, relevance, maintenance needs, and provides actionable recommendations. | Skills |
Can't find what you're looking for? Evaluate a missing skill, or if you're looking for agent context for an open source dependency, request a tile.