đź’» 100 Copilot Prompts for Cybersecurity Professionals đź’»
Maximize productivity and enhance your workflow with these **100 curated prompts** for red team (offensive), blue team (defensive), and automation tasks. Use the "Copy" button to easily grab and use the prompts!
đź”´ Red Team Prompts (Offensive Security)
Penetration Testing
“Outline a network pentest methodology for external assessments.”
“Write a step-by-step guide for SQL injection exploitation.”
“Develop a phishing campaign with payload creation and delivery methods.”
“Create a checklist for OSINT before red team engagements.”
“Document techniques for bypassing network firewalls.”
“Generate a report template for documenting pentest results.”
“List tools and scripts for wireless network pentesting.”
“Outline a process for exploiting vulnerable web applications.”
“Write a PowerShell script to enumerate Active Directory objects.”
“Describe methods for exploiting insecure APIs.”
"Outline a network pentest methodology for external assessments."
Exploit Development
“Write shellcode for a reverse TCP payload targeting Linux.”
“Develop a buffer overflow exploit for a vulnerable service.”
“Document techniques to bypass antivirus solutions.”
“Explain techniques for DLL hijacking on Windows.”
“Create a Metasploit module for custom exploit development.”
“Write a Python script for a port scanner with banner grabbing.”
“Draft a guide on heap overflow exploitation techniques.”
“Generate obfuscated PowerShell scripts for payload delivery.”
“Develop custom payloads to bypass EDR solutions.”
“Explain techniques for exploiting XXE vulnerabilities.”
🔵 Blue Team Prompts (Defensive Security)
Incident Response
“Create a response plan for insider threats.”
“Write a guide for analyzing Windows Event Logs.”
“Develop procedures for isolating compromised hosts.”
“List steps for ransomware containment and eradication.”
“Generate a template for incident response reporting.”
“Create a network monitoring playbook to detect lateral movement.”
“Write steps to analyze malware using memory dumps.”
“Outline a communication plan for cyber incidents.”
“Document techniques to preserve digital evidence.”
“Draft a strategy for post-incident recovery.”
Threat Intelligence
“Generate a report on emerging ransomware threats.”
“List IOCs for current APT activities.”
“Develop a threat hunting playbook for cloud environments.”
“Create a guide for monitoring the dark web for threats.”
“Write a Python script for automated IOC collection.”
“Outline methods for mapping adversary infrastructure.”
“Document strategies for analyzing phishing campaigns.”
“Create a process for reporting to ISACs.”
“Write a guide on analyzing spear-phishing emails.”
“Develop a report template for threat intelligence sharing.”
⚙️ Automation Prompts
“Create a Python script for automated OSINT collection.”
“Write a PowerShell script to scan for open ports.”
“Automate vulnerability scanning with Nmap and report generation.”
“Write a Bash script for network reconnaissance.”
“Develop a Python-based malware analysis automation tool.”
“Automate SIEM log analysis for detecting anomalies.”
“Write a script to scrape CVEs from the NVD database.”
“Create a Python script for DNS enumeration.”
“Automate firewall configuration auditing.”
“Develop a tool for bulk password spraying attacks.”
Conclusion
These **100 prompts** are designed for practical use across all aspects of cybersecurity, helping streamline documentation, technical tasks, and automation. Use the **"Copy"** button for quick access!