AI PROMPTS
THE OPEN AI PROMPTS LIBRARY
A community-curated library of prompts for every AI — across coding, writing, research, design, marketing, and dozens more categories. Discover, share, and remix what works.
AVAILABLE FOR EVERY AI
Claude, ChatGPT, Gemini, Cursor, Copilot, Perplexity, Grok — and any other model or assistant you use.
SEARCH FROM YOUR AGENT — MCP
Connect this library as an MCP server to Claude, Cursor, Windsurf, or any
MCP-capable client. One tool: search_prompts — query, filter, and sort the same way you do here.
URL
https://aipromptslibrary.sh/mcp OPTION A — PASTE TO YOUR AGENT Claude, Cursor, Codex, etc.
prompt
Connect to the MCP server at https://aipromptslibrary.sh/mcp (streamable-http).
OPTION B — JSON CONFIG manual setup
mcp.json
{
"mcpServers": {
"prompt-library": {
"type": "streamable-http",
"url": "https://aipromptslibrary.sh/mcp"
}
}
} Browse by category
PROMPTS LIBRARY
# PROMPT CATEGORY
- 1Linux Memory Forensics with LiME and Volatilitysecurity analystsecurity
- 2Azure Activity Logs Threat Analyzersecurity analystsecurity
- 3Ransomware Network Indicators Analyzersecurity analystsecurity
- 4Scapy Network Packet Analysis Guidesecurity analystsecurity
- 5APT TTP Mapping with MITRE Navigatorsecurity analystsecurity
- 6MISP Threat Landscape Analysis Guidesecurity analystsecurity
- 7Linux Persistence Mechanisms Analyzersecurity analystsecurity
- 8Web Server Log Intrusion Analyzersecurity analystsecurity
- 9TLS Certificate Transparency Log Analyzersecurity analystsecurity
- 10Cobalt Strike Malleable C2 Profile Analyzersecurity analystsecurity
- 11Insider Data Exfiltration DLP Analyzersecurity analystsecurity
- 12Azure AD Lateral Movement KQL Detectorsecurity analystsecurity
- 13Detect Risky OAuth Consent Grants in Entra IDsecurity analystsecurity
- 14RDP Brute Force Event Log Analyzersecurity analystsecurity
- 15UEBA Insider Threat Detection Implementationsecurity analystsecurity
- 16Rekall Memory Forensics Artifact Extractorsecurity analystsecurity
- 17Malicious Scheduled Task Sysmon Detectorsecurity analystsecurity
- 18SQL Injection Detection via WAF Logssecurity analystsecurity
- 19GitHub Actions Supply Chain Risk Scannersecurity analystsecurity
- 20Kerberos Golden Ticket Forgery Detectorsecurity analystsecurity
- 21LOLBAS Abuse Detection with Sigma Rulessecurity analystsecurity
- 22WMI Lateral Movement Detection Guidesecurity analystsecurity
- 23Shadow IT Cloud Usage Detectorsecurity analystsecurity
- 24Windows Startup Folder Persistence Huntersecurity analystsecurity
- 25Email Account Compromise Detection Proceduressecurity analystsecurity
- 26Kerberos Pass-the-Ticket Attack Detectorsecurity analystsecurity
- 27Cobalt Strike Beacon Network Detectionsecurity analystsecurity
- 28Credential Stuffing Auth Log Analyzersecurity analystsecurity
- 29SIEM APT Lateral Movement Correlation Rulessecurity analystsecurity
- 30NTLM Relay Attack Event Log Analyzersecurity analystsecurity
- 31Process Injection Techniques Huntersecurity analystsecurity
- 32Windows Service Installation Threat Huntersecurity analystsecurity
- 33Registry Run Key Persistence Detection Guidesecurity analystsecurity
- 34DNS Tunneling Detection with Entropy Analysissecurity analystsecurity
- 35MISP Threat Intelligence Sharing with PyMISPsecurity analystsecurity