
from "affaan-m/everything-claude-code"
Pi-hole installation, blocklist management, DNS-over-HTTPS setup, DHCP integration, local DNS records, and troubleshooting broken DNS resolution on a home network.
General-purpose tools and utilities for developers and power users.

from "affaan-m/everything-claude-code"
Pi-hole installation, blocklist management, DNS-over-HTTPS setup, DHCP integration, local DNS records, and troubleshooting broken DNS resolution on a home network.

from "affaan-m/everything-claude-code"
Readiness checklist for homelab VLAN segmentation, local DNS filtering, and WireGuard-style remote access before changing router, firewall, DHCP, or VPN configuration.

from "affaan-m/everything-claude-code"
Capture architectural decisions made during Claude Code sessions as structured ADRs. Auto-detects decision moments, records context, alternatives considered, and rationale. Maintains an ADR...

from "phuryn/pm-skills"
Brainstorm an inspiring, achievable, and emotional product vision that motivates teams and aligns stakeholders. Use when defining or refining a product vision, creating a vision statement,...

from "mukul975/Anthropic-Cybersecurity-Skills"
Assess SSL/TLS server configurations using the sslyze Python library to evaluate cipher suites, certificate chains,

from "mukul975/Anthropic-Cybersecurity-Skills"
Configure SSL/TLS inspection on network security devices to decrypt, inspect, and re-encrypt HTTPS traffic for

from "mukul975/Anthropic-Cybersecurity-Skills"
SSL/TLS certificate lifecycle management encompasses the full process of requesting, issuing, deploying, monitoring,

from "mukul975/Anthropic-Cybersecurity-Skills"
Simulates SSL stripping attacks using sslstrip, Bettercap, and mitmproxy in authorized environments to test

from "mukul975/Anthropic-Cybersecurity-Skills"
Enumerates DNS records, attempts zone transfers, brute-forces subdomains, and maps DNS infrastructure during

from "mukul975/Anthropic-Cybersecurity-Skills"
Detects DNS tunneling by computing Shannon entropy of DNS query names, analyzing query length distributions,

from "mukul975/Anthropic-Cybersecurity-Skills"
Implement NextDNS as a zero trust DNS filtering layer with encrypted resolution, threat intelligence blocking,

from "mukul975/Anthropic-Cybersecurity-Skills"
Configure Cloudflare DDoS protection with managed rulesets, rate limiting, WAF rules, Bot Management, and origin

from "mukul975/Anthropic-Cybersecurity-Skills"
Hunt for DNS-based persistence mechanisms including DNS hijacking, dangling CNAME records, wildcard DNS abuse,

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect domain fronting C2 traffic by analyzing SNI vs HTTP Host header mismatches in proxy logs and TLS certificate

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect DNS tunneling and data exfiltration by analyzing Zeek dns.log for high-entropy subdomain queries, excessive

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect Cobalt Strike beacon network activity using default TLS certificate signatures serial 8BB00EE , JA3/JA3S/JARM

from "mukul975/Anthropic-Cybersecurity-Skills"
Exploit misconfigured Active Directory Certificate Services AD CS ESC1 vulnerability to request certificates

from "mukul975/Anthropic-Cybersecurity-Skills"
Executes authorized attack simulations against Active Directory environments to identify misconfigurations,

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect DNS-based data exfiltration by analyzing Zeek dns.log for high-entropy subdomains and anomalous query

from "mukul975/Anthropic-Cybersecurity-Skills"
Detect data exfiltration through DNS tunneling by analyzing query entropy, subdomain length, query volume, TXT

from "mukul975/Anthropic-Cybersecurity-Skills"
Detects command-and-control C2 communications tunneled through DNS protocol including DNS tunneling tools

from "mukul975/Anthropic-Cybersecurity-Skills"
Deploying Cloudflare Access with Cloudflare Tunnel to provide zero trust access to self-hosted and private applications,

from "mukul975/Anthropic-Cybersecurity-Skills"
A Certificate Authority CA is the trust anchor in a PKI hierarchy, responsible for issuing, signing, and revoking

from "mukul975/Anthropic-Cybersecurity-Skills"
Perform DCSync attacks to replicate Active Directory credentials and establish domain persistence by extracting