AI PROMPTS
THE OPEN AI PROMPTS LIBRARY
A community-curated library of prompts for every AI — across coding, writing, research, design, marketing, and dozens more categories. Discover, share, and remix what works.
AVAILABLE FOR EVERY AI
Claude, ChatGPT, Gemini, Cursor, Copilot, Perplexity, Grok — and any other model or assistant you use.
SEARCH FROM YOUR AGENT — MCP
Connect this library as an MCP server to Claude, Cursor, Windsurf, or any
MCP-capable client. One tool: search_prompts — query, filter, and sort the same way you do here.
URL
https://aipromptslibrary.sh/mcp OPTION A — PASTE TO YOUR AGENT Claude, Cursor, Codex, etc.
prompt
Connect to the MCP server at https://aipromptslibrary.sh/mcp (streamable-http).
OPTION B — JSON CONFIG manual setup
mcp.json
{
"mcpServers": {
"prompt-library": {
"type": "streamable-http",
"url": "https://aipromptslibrary.sh/mcp"
}
}
} Browse by category
PROMPTS LIBRARY
FILTERED BY use_case_cluster: security_analysis
# PROMPT CATEGORY
- 1Cloud Storage Access Anomaly Detectoranalystsecurity
- 2Linux Memory Forensics with LiME and Volatilitysecurity analystsecurity
- 3Ransomware Network Indicators Analyzersecurity analystsecurity
- 4Malware Sandbox Evasion Techniques Analyzeranalystsecurity
- 5Scapy Network Packet Analysis Guidesecurity analystsecurity
- 6APT TTP Mapping with MITRE Navigatorsecurity analystsecurity
- 7PowerShell EVTX Script Block Analyzeranalystsecurity
- 8Cobalt Strike Malleable C2 Profile Analyzersecurity analystsecurity
- 9Insider Data Exfiltration DLP Analyzersecurity analystsecurity
- 10Detect Risky OAuth Consent Grants in Entra IDsecurity analystsecurity
- 11UEBA Insider Threat Detection Implementationsecurity analystsecurity
- 12Rekall Memory Forensics Artifact Extractorsecurity analystsecurity
- 13SQL Injection Detection via WAF Logssecurity analystsecurity
- 14Kerberos Golden Ticket Forgery Detectorsecurity analystsecurity
- 15LOLBAS Abuse Detection with Sigma Rulessecurity analystsecurity
- 16Data Staging Exfiltration Threat Hunteranalystsecurity
- 17Zeek Conn.log Beaconing Pattern Detectoranalystsecurity
- 18WMI Lateral Movement Detection Guidesecurity analystsecurity
- 19Shadow IT Cloud Usage Detectorsecurity analystsecurity
- 20T1098 Account Manipulation Hunteragentsecurity
- 21Kerberos Pass-the-Ticket Attack Detectorsecurity analystsecurity
- 22Cobalt Strike Beacon Network Detectionsecurity analystsecurity
- 23NetFlow Pandas Traffic Baselininganalystsecurity
- 24NTLM Relay Attack Event Log Analyzersecurity analystsecurity
- 25DNS-Based Persistence Hunting Proceduresanalystsecurity
- 26Arkime Network Traffic Analysis Deploymentagentsecurity