CG
Claw GRC
/Skills
DocsBlogDashboard
Start Free
Open-Source Skills Library

Cybersecurity Skills for AI Agents

The most comprehensive collection of cybersecurity skills built for autonomous AI agents. 732 expert-crafted skills across 27 domains — from cloud security and threat hunting to malware analysis and incident response. Every skill is structured for instant agent execution.

Browse All Skills →Quick Start Guide
732
Expert Skills
27
Security Domains
2,400+
Code Examples
100%
Agent-Ready

Browse by Domain

Security Operations
70 skills
Cloud Security
60 skills
Threat Hunting
55 skills
Threat Intelligence
49 skills
Application Security
46 skills
Network Security
41 skills
Malware Analysis
39 skills
Identity & Access Management
38 skills
Digital Forensics
37 skills
Container & Cloud-Native Security
30 skills
API Security
28 skills
OT & ICS Security
28 skills
Red Team & Offensive Security
27 skills
Incident Response
25 skills
Vulnerability Management
25 skills
Penetration Testing
23 skills
DevSecOps
17 skills
Endpoint Security
17 skills
Phishing Defense
16 skills
Cryptography & PKI
14 skills

732 skills across 27 categories

Digital Forensics🟡 Intermediate

Acquiring Disk Image with dd and dcfldd

Create forensically sound bit-for-bit disk images using dd and dcfldd while preserving evidence integrity through hash verification.

4 min7 examples
Identity & Access Management🟡 Intermediate

Analyzing Active Directory ACL Abuse

Detect dangerous ACL misconfigurations in Active Directory using ldap3 to identify GenericAll, WriteDACL, and WriteOwner abuse paths.

3 min1 examples
Malware Analysis🟡 Intermediate

Analyzing Android Malware with Apktool

Perform static analysis of Android APK malware samples using apktool for decompilation, jadx for Java source recovery, and androguard for permission analysis, manifest inspection, and suspicious API call detection.

3 min
Security Operations🟡 Intermediate

Analyzing API Gateway Access Logs

Parse API Gateway access logs (AWS API Gateway, Kong, Nginx) to detect BOLA/IDOR attacks, rate limit bypass, credential scanning, and injection attempts. Uses pandas for statistical analysis of request patterns and anomaly detection.

3 min2 examples
Threat Intelligence🔴 Advanced

Analyzing APT Group with MITRE Navigator

Analyze advanced persistent threat (APT) group techniques using MITRE ATT&CK Navigator to create layered heatmaps of adversary TTPs for detection gap analysis and threat-informed defense.

5 min5 examples
Security Operations🟡 Intermediate

Analyzing Azure Activity Logs for Threats

Query Azure Monitor activity logs and sign-in logs via azure-monitor-query to detect suspicious administrative operations, impossible travel, privilege escalation, and resource modifications. Builds KQL queries for threat hunting in Azure environments.

3 min2 examples
Malware Analysis🔴 Advanced

Analyzing Bootkit and Rootkit Samples

Analyzes bootkit and advanced rootkit malware that infects the Master Boot Record (MBR), Volume Boot Record (VBR), or UEFI firmware to gain persistence below the operating system. Covers boot sector analysis, UEFI module inspection, and anti-rootkit detection techniques.

8 min8 examples
Digital Forensics🟡 Intermediate

Analyzing Browser Forensics with Hindsight

Analyze Chromium-based browser artifacts using Hindsight to extract browsing history, downloads, cookies, cached content, autofill data, saved passwords, and browser extensions from Chrome, Edge, Brave, and Opera for forensic investigation.

3 min6 examples
Threat Intelligence🟡 Intermediate

Analyzing Campaign Attribution Evidence

Campaign attribution analysis involves systematically evaluating evidence to determine which threat actor or group is responsible for a cyber operation. This guide covers collecting and weighting attr.

3 min4 examples
Threat Intelligence🟡 Intermediate

Analyzing Certificate Transparency for Phishing

Monitor Certificate Transparency logs using crt.sh and Certstream to detect phishing domains, lookalike certificates, and unauthorized certificate issuance targeting your organization.

5 min4 examples
Cloud Security🟡 Intermediate

Analyzing Cloud Storage Access Patterns

Detect abnormal access patterns in AWS S3, GCS, and Azure Blob Storage by analyzing CloudTrail Data Events, GCS audit logs, and Azure Storage Analytics.

3 min2 examples
Malware Analysis🔴 Advanced

Analyzing Cobalt Strike Beacon Configuration

Extract and analyze Cobalt Strike beacon configuration from PE files and memory dumps to identify C2 infrastructure, malleable profiles, and operator tradecraft.

6 min4 examples
Security Operations🟡 Intermediate

Analyzing Cobalt Strike Malleable Profiles

Parse Cobalt Strike malleable C2 profiles using pyMalleableC2 to extract beacon configuration, HTTP communication patterns, and sleep/jitter settings. Combines with JARM TLS fingerprinting to detect C2 servers on the network.

3 min2 examples
Malware Analysis🟡 Intermediate

Analyzing Cobalt Strike Malleable C2 Profiles

Parse and analyze Cobalt Strike Malleable C2 profiles using dissect.cobaltstrike and pyMalleableC2 to extract C2 indicators, detect evasion techniques, and generate network detection signatures.

3 min
Malware Analysis🔴 Advanced

Analyzing Command and Control Communication

Analyzes malware command-and-control (C2) communication protocols to understand beacon patterns, command structures, data encoding, and infrastructure. Covers HTTP, HTTPS, DNS, and custom protocol C2 analysis for detection development and threat intelligence.

7 min8 examples
Threat Intelligence🟡 Intermediate

Analyzing Cyber Kill Chain

Analyzes intrusion activity against the Lockheed Martin Cyber Kill Chain framework to identify which phases an adversary has completed, where defenses succeeded or failed, and what controls would have interrupted the attack at earlier phases.

4 min1 examples
Digital Forensics🟡 Intermediate

Analyzing Disk Image with Autopsy

Perform comprehensive forensic analysis of disk images using Autopsy to recover files, examine artifacts, and build investigation timelines.

6 min11 examples
Security Operations🟡 Intermediate

Analyzing DNS Logs for Exfiltration

Analyzes DNS query logs to detect data exfiltration via DNS tunneling, DGA domain communication, and covert C2 channels using entropy analysis, query volume anomalies, and subdomain length detection in SIEM platforms.

6 min11 examples
Digital Forensics🟡 Intermediate

Analyzing Docker Container Forensics

Investigate compromised Docker containers by analyzing images, layers, volumes, logs, and runtime artifacts to identify malicious activity and evidence.

6 min6 examples
Digital Forensics🟡 Intermediate

Analyzing Email Headers for Phishing Investigation

Parse and analyze email headers to trace the origin of phishing emails, verify sender authenticity, and identify spoofing through SPF, DKIM, and DMARC validation.

6 min6 examples
Blockchain Security🟡 Intermediate

Analyzing Ethereum Smart Contract Vulnerabilities

Perform static and symbolic analysis of Solidity smart contracts using Slither and Mythril to detect reentrancy, integer overflow, access control, and other vulnerability classes before deployment to Ethereum mainnet.

3 min
Malware Analysis🔴 Advanced

Analyzing Golang Malware with Ghidra

Reverse engineer Go-compiled malware using Ghidra with specialized scripts for function recovery, string extraction, and type reconstruction in stripped Go binaries.

5 min2 examples
Malware Analysis🔴 Advanced

Analyzing Heap Spray Exploitation

Detect and analyze heap spray attacks in memory dumps using Volatility3 plugins to identify NOP sled patterns, shellcode landing zones, and suspicious large allocations in process virtual address space.

3 min
Threat Intelligence🟡 Intermediate

Analyzing Indicators of Compromise

Analyzes indicators of compromise (IOCs) including IP addresses, domains, file hashes, URLs, and email artifacts to determine maliciousness confidence, campaign attribution, and blocking priority.

4 min4 examples
Loading more skills…

How Agent Skills Work

Every skill follows the agentskills.io progressive disclosure pattern. AI agents load only what they need, when they need it.

1

Discovery

The agent reads only the skill's metadata — name, description, tags, and domain. This costs ~30 tokens, letting the agent scan hundreds of skills instantly to find relevance.

2

Loading

When a skill matches the task, the agent loads the full workflow — prerequisites, step-by-step commands, tool configurations, and verification checks.

3

Execution

The agent executes each step, runs scripts, applies configurations, and validates results against the verification criteria. Full audit trail included.

Skill Anatomy

Every skill follows a consistent structure that any AI agent can parse and execute. The YAML frontmatter provides instant discoverability. The body provides complete operational guidance.

✓ YAML frontmatter for instant discovery
✓ Prerequisites and tool requirements
✓ Step-by-step workflow with code
✓ Verification criteria for success
✓ MITRE ATT&CK and NIST mappings
---
name: aws-s3-bucket-security-audit
description: Audit S3 buckets for public access...
domain: cybersecurity
subdomain: cloud-security
tags: [aws, s3, cloud, audit]
---
# AWS S3 Bucket Security Audit
## Overview
Comprehensive audit of S3 bucket...
## Prerequisites
## Workflow
## Verification

Deploy Skills to Your Agents

Register your AI agents with Claw GRC and give them access to the full cybersecurity skills library. Every skill execution is logged, audited, and scored.

Start Free Trial →MCP Integration Docs

© 2026 One Frequency Inc. All rights reserved.

HomeDocsBlogPrivacy