AI PROMPTS
THE OPEN AI PROMPTS LIBRARY
A community-curated library of prompts for every AI — across coding, writing, research, design, marketing, and dozens more categories. Discover, share, and remix what works.
AVAILABLE FOR EVERY AI
Claude, ChatGPT, Gemini, Cursor, Copilot, Perplexity, Grok — and any other model or assistant you use.
SEARCH FROM YOUR AGENT — MCP
Connect this library as an MCP server to Claude, Cursor, Windsurf, or any
MCP-capable client. One tool: search_prompts — query, filter, and sort the same way you do here.
URL
https://aipromptslibrary.sh/mcp OPTION A — PASTE TO YOUR AGENT Claude, Cursor, Codex, etc.
prompt
Connect to the MCP server at https://aipromptslibrary.sh/mcp (streamable-http).
OPTION B — JSON CONFIG manual setup
mcp.json
{
"mcpServers": {
"prompt-library": {
"type": "streamable-http",
"url": "https://aipromptslibrary.sh/mcp"
}
}
} Browse by category
PROMPTS LIBRARY
FILTERED BY subcategories: threat_hunting
# PROMPT CATEGORY
- 1Cloud Storage Access Anomaly Detectoranalystsecurity
- 2Ransomware Network Indicators Analyzersecurity analystsecurity
- 3Malware Sandbox Evasion Techniques Analyzeranalystsecurity
- 4PowerShell Empire Event Log Analyzeranalystsecurity
- 5PowerShell EVTX Script Block Analyzeranalystsecurity
- 6Linux Persistence Mechanisms Analyzersecurity analystsecurity
- 7Active Directory ACL Abuse Analyzeragentsecurity
- 8Web Server Log Intrusion Analyzersecurity analystsecurity
- 9TLS Certificate Transparency Log Analyzersecurity analystsecurity
- 10Cobalt Strike Malleable C2 Profile Analyzersecurity analystsecurity
- 11AWS CloudTrail Anomaly Detection Guideagentsecurity
- 12Detect Risky OAuth Consent Grants in Entra IDsecurity analystsecurity
- 13Anomalous PowerShell Execution Hunting Guideanalystsecurity
- 14Data Staging Exfiltration Threat Hunteranalystsecurity
- 15Zeek Conn.log Beaconing Pattern Detectoranalystsecurity
- 16Domain Fronting C2 Traffic Detectoranalystsecurity
- 17WMI Lateral Movement Detection Guidesecurity analystsecurity
- 18Windows Startup Folder Persistence Huntersecurity analystsecurity
- 19T1098 Account Manipulation Hunteragentsecurity
- 20AWS IAM Privilege Escalation Detectoragentsecurity
- 21Cobalt Strike Beacon Network Detectionsecurity analystsecurity
- 22Credential Stuffing Auth Log Analyzersecurity analystsecurity
- 23NTLM Relay Attack Event Log Analyzersecurity analystsecurity
- 24DNS-Based Persistence Hunting Proceduresanalystsecurity
- 25Process Injection Techniques Huntersecurity analystsecurity
- 26Windows Service Installation Threat Huntersecurity analystsecurity
- 27Registry Run Key Persistence Detection Guidesecurity analystsecurity