$ skills/performing-memory-forensics-with-volatility3/
├── SKILL.md # Definición principal
├── references/
│ ├── standards.md # Mapeos a MITRE, NIST, D3FEND
│ └── workflows.md # Procedimiento técnico extendido
├── scripts/
│ └── process.py # Scripts auxiliares funcionales
└── assets/ └── template.md # Plantillas y checklists
skills/performing-memory-forensics-with-volatility3/
├── SKILL.md # Definición principal
├── references/
│ ├── standards.md # Mapeos a MITRE, NIST, D3FEND
│ └── workflows.md # Procedimiento técnico extendido
├── scripts/
│ └── process.py # Scripts auxiliares funcionales
└── assets/ └── template.md # Plantillas y checklists
skills/performing-memory-forensics-with-volatility3/
├── SKILL.md # Definición principal
├── references/
│ ├── standards.md # Mapeos a MITRE, NIST, D3FEND
│ └── workflows.md # Procedimiento técnico extendido
├── scripts/
│ └── process.py # Scripts auxiliares funcionales
└── assets/ └── template.md # Plantillas y checklists
---
name: performing-memory-forensics-with-volatility3
description: ">-" Analyze memory dumps to extract running processes, network connections, injected code, and malware artifacts using the Volatility3 framework.
domain: cybersecurity
subdomain: digital-forensics
tags: [forensics, memory-analysis, volatility3, incident-response, dfir]
atlas_techniques: [AML.T0047]
d3fend_techniques: [D3-MA, D3-PSMD]
nist_ai_rmf: [MEASURE-2.6]
nist_csf: [DE.CM-01, RS.AN-03]
version: "1.2"
author: mukul975
license: Apache-2.0
---
---
name: performing-memory-forensics-with-volatility3
description: ">-" Analyze memory dumps to extract running processes, network connections, injected code, and malware artifacts using the Volatility3 framework.
domain: cybersecurity
subdomain: digital-forensics
tags: [forensics, memory-analysis, volatility3, incident-response, dfir]
atlas_techniques: [AML.T0047]
d3fend_techniques: [D3-MA, D3-PSMD]
nist_ai_rmf: [MEASURE-2.6]
nist_csf: [DE.CM-01, RS.AN-03]
version: "1.2"
author: mukul975
license: Apache-2.0
---
---
name: performing-memory-forensics-with-volatility3
description: ">-" Analyze memory dumps to extract running processes, network connections, injected code, and malware artifacts using the Volatility3 framework.
domain: cybersecurity
subdomain: digital-forensics
tags: [forensics, memory-analysis, volatility3, incident-response, dfir]
atlas_techniques: [AML.T0047]
d3fend_techniques: [D3-MA, D3-PSMD]
nist_ai_rmf: [MEASURE-2.6]
nist_csf: [DE.CM-01, RS.AN-03]
version: "1.2"
author: mukul975
license: Apache-2.0
---
winget -weight: 500;">install OpenJS.NodeJS.LTS
mkdir security-agent
cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
winget -weight: 500;">install OpenJS.NodeJS.LTS
mkdir security-agent
cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
winget -weight: 500;">install OpenJS.NodeJS.LTS
mkdir security-agent
cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
-weight: 500;">brew -weight: 500;">install node
mkdir security-agent && cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
-weight: 500;">brew -weight: 500;">install node
mkdir security-agent && cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
-weight: 500;">brew -weight: 500;">install node
mkdir security-agent && cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
# Debian / Ubuntu
-weight: 500;">curl -fsSL https://deb.nodesource.com/setup_lts.x | -weight: 600;">sudo -E bash -
-weight: 600;">sudo -weight: 500;">apt-get -weight: 500;">install -y nodejs # Fedora
-weight: 600;">sudo -weight: 500;">dnf -weight: 500;">install -y nodejs # Arch
-weight: 600;">sudo -weight: 500;">pacman -S nodejs -weight: 500;">npm mkdir security-agent && cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
# Debian / Ubuntu
-weight: 500;">curl -fsSL https://deb.nodesource.com/setup_lts.x | -weight: 600;">sudo -E bash -
-weight: 600;">sudo -weight: 500;">apt-get -weight: 500;">install -y nodejs # Fedora
-weight: 600;">sudo -weight: 500;">dnf -weight: 500;">install -y nodejs # Arch
-weight: 600;">sudo -weight: 500;">pacman -S nodejs -weight: 500;">npm mkdir security-agent && cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
# Debian / Ubuntu
-weight: 500;">curl -fsSL https://deb.nodesource.com/setup_lts.x | -weight: 600;">sudo -E bash -
-weight: 600;">sudo -weight: 500;">apt-get -weight: 500;">install -y nodejs # Fedora
-weight: 600;">sudo -weight: 500;">dnf -weight: 500;">install -y nodejs # Arch
-weight: 600;">sudo -weight: 500;">pacman -S nodejs -weight: 500;">npm mkdir security-agent && cd security-agent
npx skills add mukul975/Anthropic-Cybersecurity-Skills
-weight: 500;">git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.-weight: 500;">git
cd Anthropic-Cybersecurity-Skills
ls skills/ | head
-weight: 500;">git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.-weight: 500;">git
cd Anthropic-Cybersecurity-Skills
ls skills/ | head
-weight: 500;">git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.-weight: 500;">git
cd Anthropic-Cybersecurity-Skills
ls skills/ | head
# Prompt al agente
Usa la habilidad performing-memory-forensics-with-volatility3
sobre el archivo dumps/infected_host.mem y reporta los procesos
sospechosos con sus árboles de herencia.
# Prompt al agente
Usa la habilidad performing-memory-forensics-with-volatility3
sobre el archivo dumps/infected_host.mem y reporta los procesos
sospechosos con sus árboles de herencia.
# Prompt al agente
Usa la habilidad performing-memory-forensics-with-volatility3
sobre el archivo dumps/infected_host.mem y reporta los procesos
sospechosos con sus árboles de herencia.
# .github/workflows/security-agent.yml
name: security-agent
on: [pull_request]
jobs: review: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 - name: Clonar skills run: -weight: 500;">git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.-weight: 500;">git .skills - name: Ejecutar agente env: ANTHROPIC_API_KEY: ${{ secrets.ANTHROPIC_API_KEY }} run: | claude-code review \ --skills-path .skills/skills \ --focus "devsecops,container-security,api-security" \ --diff HEAD~1..HEAD
# .github/workflows/security-agent.yml
name: security-agent
on: [pull_request]
jobs: review: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 - name: Clonar skills run: -weight: 500;">git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.-weight: 500;">git .skills - name: Ejecutar agente env: ANTHROPIC_API_KEY: ${{ secrets.ANTHROPIC_API_KEY }} run: | claude-code review \ --skills-path .skills/skills \ --focus "devsecops,container-security,api-security" \ --diff HEAD~1..HEAD
# .github/workflows/security-agent.yml
name: security-agent
on: [pull_request]
jobs: review: runs-on: ubuntu-latest steps: - uses: actions/checkout@v4 - name: Clonar skills run: -weight: 500;">git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills.-weight: 500;">git .skills - name: Ejecutar agente env: ANTHROPIC_API_KEY: ${{ secrets.ANTHROPIC_API_KEY }} run: | claude-code review \ --skills-path .skills/skills \ --focus "devsecops,container-security,api-security" \ --diff HEAD~1..HEAD - Atomic Red Team — De Red Canary, es una librería de pruebas de emulación de adversarios mapeada a ATT&CK. A diferencia de Anthropic Cybersecurity Skills, está pensada para ejecución directa por operadores humanos, no para descubrimiento por agentes. No tiene estructura YAML estándar ni mapeo cruzado a NIST, ATLAS o AI RMF.- Sigma rules — El repositorio oficial de Sigma ofrece miles de reglas de detección portables entre SIEMs. Es complementario, no sustituto: Sigma cubre la capa de detección declarativa, mientras que este proyecto cubre el flujo completo de ejecución e interpretación que un agente necesita.- MITRE CALDERA — Plataforma open source para operaciones automatizadas de red team. Más robusta para emulación adversarial, pero exige infraestructura propia (servidor, agentes desplegados) y su curva de adopción es más alta. No se integra directamente con agentes conversacionales. - mukul975/Anthropic-Cybersecurity-Skills en GitHub- Homepage oficial del proyecto- Estándar agentskills.io- MITRE ATT&CK- NIST Cybersecurity Framework 2.0- MITRE ATLAS- MITRE D3FEND- NIST AI Risk Management Framework