300 CYBERSECURITY PROMPTS FOR COPILOT
Your wish is my command, sir 🖤
THREAT INTELLIGENCE
RANSOMWARE THREAT DOSSIER
Construct an exhaustive threat intelligence dossier on ransomware campaigns active within the past 90 days, synthesizing data from authoritative web sources (BleepingComputer, Dark Reading) & X posts with over 100 engagements. Categorize by target sectors (finance, healthcare), quantify ransom demands (median BTC value), dissect infection vectors (spear phishing, RCE exploits), & compile a minimum of 15 IOCs (IPs, hashes, domains), each validated against threat feeds (VirusTotal, Abuse.ch) with hit rates & attribution (REvil). Include a trend analysis (ex: % increase in attacks) & a downloadable CSV of findings.
COPY!
X PROFILE CYBERCRIME ANALYSIS
Execute a forensic grade analysis of the X profile @CyberThreatGuru for potential cybercriminal activity over the last 120 days. Scrutinize posting cadence (bursts vs. steady), shared URLs (resolve via curl, check for redirects to sinkholes), follower/following dynamics (bot-like ratios), keyword prevalence (0day, RaaS), & bio metadata (join date, location). Assign a risk score (1-10) with a granular breakdown (3 points for malicious links), supplemented by a timeline of suspicious activity & a recommendation (monitor, report) backed by screenshots or text excerpts.
COPY!
QAKBOT MALWARE SEARCH
Conduct an advanced X search for mentions of Qakbot malware in the past 14 days, prioritizing posts with over 75 likes or retweets. Classify results by attack specifics (persistence via WMI), geolocation (inferred from user profiles), & IOCs (C2 IPs), then cross verify URLs with web based sandboxes (Any.Run) for malicious behavior (DLL sideloads). Produce a structured summary with heatmaps of activity, a list of actionable IOCs, & a confidence rating per finding (95% for confirmed exploits).
COPY!
THREAT ACTOR PROFILING
Profile the top 5 threat actors targeting the healthcare industry based on the latest web intelligence from FireEye & Recorded Future in 2025. For each, detail aliases (FIN7), TTPs spear phishing links), preferred malware (Carbanak RAT), & recent campaigns (last 3 attacks with dates, targets, outcomes). Map to MITRE ATT&CK, include victimology (hospitals), & provide a chronological attack matrix with source citations.
COPY!
IOC EXTRACTION FROM PDF
Extract & meticulously catalog every IOC from this PDF threat report uploaded here: [upload file], encompassing domains (evil.com), IPs (192.168.1.1), file hashes (MD5, SHA256), & YARA signatures if present. Cross check each against OTX AlienVault for known associations, detailing hit counts, threat types (trojan), & last seen dates. Output a tabulated report with sortable columns, a detection rule (Snort signature), & a JSON export for SIEM ingestion.
COPY!
MAJOR INCIDENT TIMELINE
Assemble a meticulous timeline of all major cybersecurity incidents exceeding 1 million records breached in 2025, sourced from web articles (ex: KrebsOnSecurity, ZDNet). For each event, list the victim organization, breach size (ex: 2M users), attack vector (e.g., SQLi), & root cause (ex: unpatched CVE), with hyperlinks, a severity ranking (ex: 1-5 based on impact), & a visual timeline description exportable to PDF.
COPY!
LAZARUS TTP MAPPING
Map the TTPs of the Lazarus threat group to the MITRE ATT&CK framework using the latest 5 web articles from CrowdStrike & Symantec in 2025. Provide a breakdown by phase (ex: Initial Access: T1190), associated malware (ex: HIDDEN COBRA), & mitigation strategies (ex: disable macros), with references to original research & a STIX 2.1 bundle.
COPY!
X POST CREDIBILITY CHECK
Evaluate the credibility of this X post claiming a new zero day in Windows, posted on March 22, 2025: [paste text]. Analyze the poster’s history (ex: posts, join date, engagement), verify linked sources via web searches (e.x: domain age, WHOIS), & assess technical feasibility with a confidence score (ex: 85%). Include a 5-step validation process (ex: packet capture) & a risk advisory.
COPY!
EMERGING THREAT TRENDS
Summarize the top 5 emerging cybersecurity threats trending on X over the past 72 hours, filtering for posts with over 50 engagements. For each, extract dominant hashtags (ex: #CyberSec), key phrases, sentiment (ex: 70% negative), and supporting web links, then rank by potential impact (ex: high for zero days) with reasoning & a raw data appendix.
COPY!
CVE-2025-9876 BRIED
Generate an expert level threat brief on CVE-2025-9876 using web & X data from the last 30 days. Include vulnerability details (ex: CVSS 9.8, affected Windows 11), exploit availability (ex: PoC on GitHub), real world attack evidence (ex: X posts with IOCs), & a step-by-step mitigation plan with vendor patch links (ex: Microsoft KB5001234).
COPY!
BOTNET ACTIVITY REPORT
Compile a detailed report on botnet activity targeting financial institutions over the past 60 days, using web sources like Dark Reading & X posts with over 200 engagements. Detail infection methods (ex: Mirai variants via IoT), C2 infrastructure (ex: 50 IPs), & victim stats (ex: 20 banks hit), with 10 IOCs validated against ThreatGrid & a trend chart.
COPY!
APT GROUP EVOLUTION
Trace the evolution of the APT29 group from 2020 to 2025 using web research from Mandiant & X threads. Detail shifts in TTPs (e.x: phishing to supply chain), malware (ex: Sunburst to FoggyWeb), & targets (ex: government to tech), with a timeline, 5 IOCs per phase, & a visual evolution map exportable to SVG.
COPY!
DARK WEB LEAK ANALYSIS
Analyze dark web leaks mentioning stolen credentials from retail companies over the past 45 days, sourced from web forums & X posts with over 100 likes. Extract data types (ex: emails, hashes), volume (ex: 500K records), & sellers (ex: aliases), then validate with Have I Been Pwned & provide a risk summary with mitigation steps.
COPY!
PHISHING CAMPAIGN BREAKDOWN
Dissect phishing campaigns targeting remote workers in the past 30 days using web reports from Proofpoint & X posts with over 150 engagements. Detail lures (ex: fake Zoom invites), delivery (ex: email with malicious PDFs), & IOCs (ex: 10 domains), with a victim profile (ex: 60% SMEs) & a detection guide for Outlook.
COPY!
SUPPLY CHAIN ATTACK INTEL
Generate a comprehensive intelligence report on supply chain attacks in the software industry over the past 90 days, using web sources like MITRE & X posts with over 200 retweets. Include attack vectors (ex: compromised updates), targets (ex: 15 SaaS firms), & IOCs (ex: 12 hashes), with a mitigation playbook & a trend analysis.
COPY!
ZERO DAY EXPLOIT TRACKING
Track zero day exploits reported on X in the past 14 days with over 300 engagements, cross referenced with web sources like Exploit-DB. Detail vulnerabilities (ex: CVE-2025-1111 in Chrome), exploit code availability (ex: GitHub links), & impact (ex: 50K devices), with a priority list & mitigation steps.
COPY!
IoT THREAT ASSESSMENT
Assess threats targeting IoT devices in smart homes over the past 60 days, using web data from Trend Micro & X posts with over 100 likes. Detail attack methods (ex: Telnet brute force), malware (ex: Mirai), & IOCs (e.x: 8 IPs), with a risk score (ex: 8/10) & a hardening guide for consumer routers.
COPY!
INSIDER THREAT PROFILING
Profile insider threat incidents in the tech sector over the past 120 days, using web case studies from Verizon DBIR & X posts with over 150 retweets. Detail motives (ex: financial gain), methods (ex: USB exfiltration), & detection (e.x: DLP alerts), with 5 case examples & a prevention checklist.
COPY!
CRYPTOJACKING CAMPAIGN ANALYSIS
Analyze cryptojacking campaigns targeting cloud servers in the past 30 days, using web reports from Palo Alto & X posts with over 200 engagements. Detail infection (ex: Docker misconfigs), payloads (ex: XMRig), & IOCs (ex: 10 domains), with a victim breakdown (ex: 70% AWS) & a removal script.
COPY!
BEC SCAM INTELLIGENCE
Compile intelligence on Business Email Compromise scams targeting executives in the past 45 days, using web sources from Barracuda & X posts with over 100 likes. Detail tactics (ex: CEO spoofing), losses (ex: $500K avg), & IOCs (e.g., 7 email domains), with a detection rule for Exchange & a training snippet.
COPY!
EXPLOIT KIT TRENDS
Summarize trends in exploit kit usage (ex: RIG, Magnitude) over the past 90 days, using web data from Sophos & X posts with over 150 engagements. Detail delivery (ex: malvertising), exploits (ex: CVE-2025-2222), and IOCs (ex: 12 URLs), with a trend graph & a browser hardening guide.
COPY!
MOBILE MALWARE REPORT
Generate a report on mobile malware targeting Android devices in the past 60 days, using web sources from Lookout & X posts with over 100 retweets. Detail infection (ex: sideloaded APKs), behavior (ex: SMS theft), & IOCs (ex: 10 hashes), with a victim profile (ex: 80% US) & a mitigation plan.
COPY!
DDoS ATTACK INSIGHTS
Provide insights into DDoS attacks exceeding 100 Gbps in the past 30 days, using web reports from Cloudflare & X posts with over 200 engagements. Detail methods (ex: SYN floods), targets (ex: gaming sites), & IOCs (ex: 15 IPs), with a mitigation strategy & a bandwidth trend analysis.
COPY!
APT CAMPAIGN SUMMARY
Summarize APT campaigns targeting critical infrastructure in the past 120 days, using web data from Kaspersky & X posts with over 150 likes. Detail TTPs (e.g., spear phishing with zero days), malware (ex: Triton), & IOCs (ex: 10 domains), with a sector breakdown (ex: 50% energy) & a defense playbook.
COPY!
INCIDENT RESPONSE
RANSOMWARE RESPONSE PLAYBOOK
Develop a granular incident response playbook for a ransomware incident targeting a Windows domain controller. Include phases (Preparation: harden GPOs; Identification: EDR alerts; Containment: isolate via VLAN; Eradication: decryptor search; Recovery: restore from Veeam; Lessons Learned: RCA doc), specific tools (ex: CrowdStrike Falcon), scripts (ex: PowerShell to disable SMBv1), & a communication template for stakeholders, completed within 48 hours.
COPY!
SIEM LOG ANALYSIS
Analyze this CSV incident log uploaded here: [upload file] from a Splunk SIEM over the past 7 days. Parse timestamps, event IDs, source/destination IPs, & user agents to reconstruct the attack timeline, identify the initial vector (ex: phishing email at 2025-03-20 14:32 UTC), & flag anomalies (ex: privilege escalation) with a detailed timeline mitigation steps (ex: block IP).
COPY!
SUPPLY CHAIN IR STRATEGY
Outline a detailed response strategy for a supply chain attack detected in a hybrid cloud environment, aligned with NIST 800-161. Specify detection methods (e.g., anomaly in API calls), containment steps (e.g., revoke compromised keys), and forensic preservation (e.g., memory dumps), with a decision tree for escalation and a 72-hour action plan.
COPY!
BEC EMAIL HEADER ANALYSIS
Dissect this email header uploaded here: [paste text] for signs of BEC spoofing over the past 24 hours. Analyze fields (e.g., From, Received, X-Originating-IP), trace IP hops using web lookups, check SPF/DKIM alignment, and provide a verdict (e.g., malicious) with a step-by-step explanation and mitigation (e.g., block sender).
COPY!
INSIDER THEFT CHECKLIST
Create a comprehensive investigation checklist for an insider data theft incident in a corporate LAN within the past 30 days. Include steps for log collection (e.g., AD audit logs), user behavior analysis (e.g., DLP alerts), volatile data capture (e.g., RAM via FTK Imager), and legal considerations (e.g., chain of custody), with a 15-step process and tools like Splunk.
COPY!
LATERAL MOVEMENT ent RESPONSE
Detail the immediate response actions for a lateral movement incident detected via NetFlow spikes on a Linux server within the past 12 hours. Specify containment (ex: iptables DROP rules), evidence collection (ex: tcpdump on eth0), & triage (ex: ps aux for rogue processes), with a 15 minute action plan & rollback options.
COPY!
SSH BRUTE FORCE LOG PARSE
Parse this JSON SIEM alert log uploaded here: [upload file] for evidence of a brute force attack against SSH over the past 48 hours. Extract failed login attempts, correlate IPs with geolocation via web API, & recommend blocklists (ex: Fail2Ban) with a sample config & a block effectiveness report.
COPY!
APT INTRUSION REPORT
Draft an executive-level incident report for an APT intrusion based on this forensic summary uploaded here: [upload file] from the past 7 days. Include attack overview (ex: spear phishing entry), impact (ex: 500GB exfiltrated), root cause (ex: CVE-2025-1234), & mitigation status, with a visual timeline & risk heatmap exportable to PowerPoint.
COPY!
CRYPTOMINER QUARANTINE SCRIPT
Generate a Python script to isolate an Ubuntu host infected with a cryptominer from a VLAN 10 network within the past 24 hours. Include commands (ex: ip link set eth0 down), logging (ex: to syslog), & rollback options, with inline comments explaining each function & a deployment guide.
COPY!
WORM OUTBREAK VALIDATION
Assess the validity & urgency of this X post claiming a worm outbreak on March 22, 2025: [paste text]. Verify via web searches (ex: CVE mentions), check poster credibility (ex: historical accuracy), & outline a 5 step validation process (ex: packet capture, hash checks) with response triggers & a 12 hour action plan.
COPY!
DDoS RAPID RESPONSE
Outline a rapid response plan for a DDoS attack detected via Cloudflare alerts on an e-commerce site within the past 6 hours. Specify containment (ex: rate limit IPs), evidence capture (ex: HAR files), and triage (ex: check origin logs), with a 10 minute timeline & mitigation steps (ex: activate DDoS shield).
COPY!
PHISHING INCIDENT PLAYBOOK
Develop a detailed playbook for a phishing incident targeting Office 365 users over the past 48 hours. Include phases (Preparation: enforce MFA; Identification: Azure AD alerts; Containment: block URLs; Eradication: remove emails; Recovery: reset creds), tools (ex: Microsoft Defender), & a stakeholder email template.
COPY!
MALWARE OUTBREAK TRIAGE
Detail the triage process for a malware outbreak detected via EDR on 50 Windows endpoints within the past 12 hours. Specify evidence collection (ex: Procmon logs), containment (ex: network isolation), & analysis (e.g., hash lookups), with a 2 hour timeline & a rollback script.
COPY!
SQL INJECTION RESPONSE
Provide a response plan for a SQL injection attack detected via WAF logs on an IIS server within the past 24 hours. Include containment (ex: block IP in web.config), evidence (ex: SQL logs), & mitigation (ex: parameterize queries), with a 30 minute action plan & validation steps.
COPY!
DATA EXFILTRATION IR
Create an IR strategy for a data exfiltration incident in an AWS S3 bucket over the past 72 hours. Specify detection (ex: CloudTrail anomalies), containment (ex: lock bucket), & forensics (ex: S3 access logs), with a 48 hour timeline and a compliance report for GDPR.
COPY!
CREDENTIAL STUFFING RESPONSE
Outline a response to a credential stuffing attack on an O365 tenant detected via Azure AD logs within the past 6 hours. Include containment (ex: enforce MFA), evidence (ex: sign-in logs), & mitigation (ex: reset passwords), with a 1 hour timeline & a user notification template.
COPY!
ZERO DAY IR PLAN
Develop an IR plan for a zero day exploit detected via IDS on a Linux web server within the past 24 hours. Specify detection (ex: anomaly rules), containment (ex: block IPs), & mitigation (ex: emergency patch), with a 12 hour timeline & a rollback procedure.
COPY!
INSIDER LEAK INVESTIGATION
Conduct an investigation into an insider leak detected via DLP alerts on a corporate laptop within the past 48 hours. Include evidence collection (e.x: USB logs), analysis (ex: file access timelines), & mitigation (ex: suspend user), with a 10 step checklist & a legal report.
COPY!
BOTNET INFECTION RESPONSE
Detail a response to a botnet infection detected via NetFlow on an IoT device within the past 12 hours. Specify containment (ex: VLAN isolation), evidence (ex: packet captures), & eradication (ex: firmware reset), with a 2 hour timeline & a mitigation script.
COPY!
RCE INCIDENT PLAYBOOK
Create a playbook for a remote code execution incident on an Apache server within the past 24 hours. Include phases (Identification: IDS alerts; Containment: block IPs; Eradication: patch CVE-2025-5678; Recovery: restore configs), tools (ex: ModSecurity), & a 12 hour action plan.
COPY!
CRYPTOGRAPHING IR
Outline an IR plan for a cryptojacking incident detected via CPU spikes on an AWS EC2 instance within the past 6 hours. Specify containment (ex: terminate instance), evidence (ex: process logs), & mitigation (ex: update IAM), with a 1 hour timeline & a cost analysis.
COPY!
APT LATERAL MOVEMENT
Develop a response strategy for an APT lateral movement incident detected via Zeek logs on a Windows network within the past 72 hours. Include containment (ex: disable SMB), evidence (ex: memory dumps), & eradication (ex: remove backdoors), with a 48 hour timeline & a forensic report.
COPY!
PHISHING EMAIL CLEANUP
Provide a cleanup plan for a phishing email campaign detected in Gmail inboxes within the past 24 hours. Specify identification (ex: G Suite alerts), containment (ex: delete emails), & mitigation (ex: update filters), with a 12 hour timeline & a user education snippet.
COPY!
VULNERABILITY MANAGEMENT
TOP CVEs IN 2025
Compile a detailed list of the top 10 CVEs reported in 2025 from web sources like NVD & X posts with over 50 retweets. For each, provide CVSS v3.1 scores (ex: 8.9), affected software versions (ex: Apache 2.4.50), exploit status (ex: PoC available), patch links, & a risk ranking based on exploitability with a CSV export.
COPY!
NESSUS SCAN ANALYSIS
Analyze this Nessus XML vulnerability scan uploaded here: [upload file] from a DMZ network over the past 7 days. Parse findings by severity (ex: Critical, High), map to CVEs (ex: CVE-2025-4567), calculate remediation urgency (ex: CVSS x exploit age), & produce a prioritized action plan with deadlines & a rescan validation.
Copy
CVE-2025-4567 X TRACKING
Search X for user reports of CVE-2025-4567 exploitation in the wild over the past 14 days, filtering for posts with technical details. Aggregate posts with payloads, validate via Exploit-DB, & summarize impact (ex: 50% unpatched rate) with mitigation steps (ex: patch to v1.2.3) & a trend graph.
COPY!
BUFFER OVERFLOW REMEDIATION
Generate an expert remediation guide for a buffer overflow vulnerability in a C++ application within the past 30 days. Include code audit techniques (ex: grep for strcpy), patch examples (ex: use strncpy), testing scripts (ex: fuzzing with AFL), & verification steps (ex: Valgrind output) with a sample fix.
COPY!
HYBRID IT VULN DASHBOARD
Design a vulnerability management dashboard template for a hybrid IT environment, tracking open CVEs & patch latency over the past 90 days. Include fields for asset inventory, risk scores, remediation owners, & PCI DSS compliance flags, exportable to CSV with a sample layout.
COPY!
CVE COMPARISON
Compare the exploit potential of CVE-2025-1111 & CVE-2025-2222 using web data from NVD over the past 30 days. Detail attack vectors (ex: remote code execution), prerequisites (ex: local access), PoC availability, & business impact (ex: downtime cost), with a decision matrix for prioritization.
COPY!
ORACLE DB VULN SUMMARY
Summarize the latest 5 vulnerabilities in Oracle Database from web sources like Bugtraq in 2025. For each, list CVEs, affected versions (ex: 19c), exploit details (ex: SQL injection), & mitigation (ex: patch 19.21.0), with vendor advisory links & a detection script.
COPY!
RHEL PATCH PLAN
Create a patch deployment plan for RHEL servers based on this vulnerability list uploaded here: [upload file] from the past 14 days. Specify patch sources (ex: yum repos), testing phases (ex: QA sandbox), rollback procedures (ex: snapshot revert), & post patch validation (ex: nmap scans) with a 7 day timeline.
COPY!
X IoT VULN ANALYSIS
Analyze the X profile @IoTSecExpert for posts about unpatched IoT devices in the last 30 days. Infer targeted vulnerabilities (ex: CVE-2025-4444), extract IOCs from linked content, & assess intent (ex: researcher vs. attacker) with a threat summary & evidence excerpts.
COPY!
APACHE CVE TEST PLAN
Detail a penetration test plan to validate exposure to CVE-2025-5555 on an Apache server within the past 14 days. Include tools (ex: Metasploit module), exploit steps (ex: craft HTTP request), detection signatures (ex: 500 error), & remediation validation (ex: retest post patch) with a sample report.
COPY!
WINDOWS VULN PRIORITIZATION
Prioritize vulnerabilities in a Windows 10 environment based on this scan report uploaded here: [upload file] from the past 7 days. Rank by CVSS scores, exploit availability, & asset criticality, with a 5 day remediation plan & validation steps (ex: SCCM checks).
COPY!
XSS VULN FIX GUIDE
Provide a remediation guide for an XSS vulnerability in a PHP web app within the past 30 days. Include detection (ex: grep for unsanitized inputs), fixes (ex: use htmlspecialchars), testing (ex: OWASP ZAP), & validation (ex: no alerts) with a sample patch & rollback plan.
Copy
CLOUD Vuln Assessment
Assess vulnerabilities in an AWS environment based on this report uploaded here: [upload file] from the past 14 days. Detail misconfigs (ex: public S3), CVEs (ex: CVE-2025-6666), & remediation (e.g., update IAM), with a 10 day plan & validation via AWS Config.
COPY!
PATCH! COMPLIANCE REPORT
Generate a compliance report for patch status on 100 Linux servers over the past 90 days. Include patch levels (ex: kernel 5.4.0), missing updates (ex: CVE-2025-7777), & compliance with CIS benchmarks, with a summary table & remediation steps.
COPY!
SQLi VULN MITIGATION
Create a mitigation plan for a SQL injection vulnerability in a MySQL database within the past 30 days. Include detection (ex: error logs), fixes (ex: prepared statements), testing (ex: sqlmap), & validation (e.g., no errors) with a sample query fix.
COPY!
IoT PATCH STRATEGY
Develop a patch strategy for IoT devices in a smart factory based on this vuln list uploaded here: [upload file] from the past 14 days. Specify firmware updates, testing (ex: sandbox), rollback (ex: factory reset), and validation (ex: vuln scan) with a 10 day timeline.
COPY!
VULN TREND ANALYSIS
Analyze X posts for trends in unpatched vulnerabilities over the past 60 days, filtering for posts with over 100 engagements. Extract CVEs (ex: CVE-2025-8888), impacted systems (ex: routers), & mitigation advice, with a trend summary & a risk heatmap.
COPY!
CRITICAL VULN REPORT
Generate a report on critical vulnerabilities (CVSS >9.0) in a corporate network over the past 30 days, based on this scan uploaded here: [upload file]. Detail CVEs, exploit status, and remediation (ex: patch within 48 hours), with a priority list & validation steps.
COPY!
WEB APP VULN FIX
Provide a fix guide for a CSRF vulnerability in a Node.js app within the past 14 days. Include detection (ex: missing tokens), fixes (ex: CSRF middleware), testing (ex: Burp replay), & validation (e.g., no bypass) with a sample code snippet.
COPY!
FIRMWARE VULN ASSESSMENT
Assess firmware vulnerabilities in Cisco routers based on this report uploaded here: [upload file] from the past 30 days. Detail CVEs (ex: CVE-2025-9999), exploit risks, & remediation (ex: update IOS), with a 7 day plan & validation via nmap.
COPY!
PATCH LATENCY ANALYSIS
Analyze patch latency for Windows servers over the past 90 days, based on this SCCM report uploaded here: [upload file]. Detail unpatched CVEs, latency (ex: 30 days avg), & compliance gaps, with a remediation plan & a latency reduction strategy.
COPY!
MOBILE APP VULN CHECK
Check for vulnerabilities in an Android app based on this scan report uploaded here: [upload file] from the past 14 days. Detail issues (ex: insecure storage), CVEs (ex: CVE-2025-0001), & fixes (ex: encrypt data), with a 5 day remediation plan & validation steps.
COPY!
LEGACY SYSTEM VULN REPORT
Generate a vuln report for legacy Windows XP systems over the past 60 days, based on this scan uploaded here: [upload file]. Detail CVEs, exploit risks (ex: EternalBlue), & mitigation (ex: isolate network), with a 10 day plan & validation via Nessus.
COPY!
PENETRATION TESTING
SaaS PENTEST ENGAGEMENTS
Design an advanced penetration testing engagement for a SaaS platform, adhering to OWASP standards within the past 30 days. Define scope (ex: APIs, auth flows), tools (ex: Burp Suite Pro), attack scenarios (ex: session hijacking), & deliverables (ex: PoC videos), with a rules of engagement document & a PDF report.
COPY!
PRIVILEGE ESCALATION TEST
Simulate a privilege escalation test against a Windows 10 host in a lab environment within the past 14 days. Detail steps (ex: exploit CVE-2025-6666 via PowerShell), expected logs (ex: Event ID 4672), detection methods (ex: Sysmon), & cleanup (ex: remove backdoors) with a sample script.
COPY!
COMMAND INJECTION PAYLOADS
Generate 15 custom payloads for testing command injection in a PHP app within the past 7 days. Include encodings (ex: base64), delivery methods (ex: POST parameter), execution triggers (ex: system()), & test commands (ex: whoami), with a compatibility matrix & a JSON export.
COPY!
APACHE Log PENTEST ANALYSIS
Analyze this Apache log uploaded here: [upload file] for prior penetration attempts over the past 30 days. Filter for suspicious patterns (ex: 403s from /admin), geolocate IPs, correlate with GreyNoise, & estimate attack sophistication (ex: script kiddie) with a timeline & recommendations.
COPY!
EXTERNAL NETWORK PENTEST REPORT
Create a detailed pentest report for an external network test against 192.168.1.0/24 within the past 14 days. Include methodology (ex: OSINT via Shodan), findings (ex: open RDP on 3389), risk ratings (ex: CVSS), & remediation (ex: disable ports), with screenshots & a Word export.
COPY!
nmap SCRIPTING TECHNIQUES
Search X for advanced nmap scripting techniques posted in the last 60 days with over 100 likes. Summarize 4 techniques (ex: NSE for SMB vuln scanning), provide script snippets, & explain use cases (ex: stealth enumeration) with references & a sample nmap command.
COPY!
CVE-2025-7777 EXPLOIT GUIDE
Provide an expert guide to exploit CVE-2025-7777 in a test VM within the past 14 days. Include prerequisites (ex: Python 3.9), exploit code from Exploit-DB, execution steps (ex: buffer overflow via socket), & detection evasion (ex: random sleep), with ethical disclaimers.
COPY!
SOCIAL ENGINEERING ATTACK
Craft a social engineering attack vector for a payroll update pretext targeting the finance team within the past 7 days. Include a phishing email (ex: spoofed CFO domain), vishing script (ex: urgency cues), & success metrics (ex: click rate >20%), with legal compliance notes.
COPY!
JSON API PENTEST
Evaluate this JSON API response uploaded here: [upload file] for pentest vulnerabilities within the past 14 days. Check for flaws (ex: IDOR via user_id), test injections (ex: ‘ OR 1=1), enumerate endpoints (ex: /api/v2/*), & provide a risk summary with PoC curl commands.
COPY!
WIRELESS PENTESTING TOOLS
List & describe 12 open source tools for pentesting wireless networks within the past 30 days. Include download links (ex: GitHub), setup commands (ex: apt install aircrack-ng), use cases (ex: WPA2 cracking), and sample outputs (ex: handshake capture), sourced from web reviews.
COPY!
SQLi PENTEST PLAN
Design a pentest plan for SQL injection on a MySQL web app within the past 14 days. Include tools (ex: sqlmap), steps (ex: inject ‘ OR 1=1), detection (ex: error messages), and remediation (ex: prepared statements), with a sample report & ethical guidelines.
COPY!
XSS PAYLOAD GENERATION
Generate 10 XSS payloads for testing a web app within the past 7 days. Include variants (ex: ), delivery (ex: URL param), & triggers (ex: onmouseover), with a test script (ex: curl) & a mitigation guide for developers.
COPY!
INTERNAL NETWORK TEST
Simulate an internal network pentest on 10.0.0.0/24 within the past 30 days. Detail steps (ex: ARP spoofing via Ettercap), logs (ex: packet captures), & evasion (ex: spoofed MAC), with a cleanup plan & a sample report exportable to PDF.
COPY!
API TOKENEX EXPOSURE TEST
Test for API token exposure in a REST API within the past 14 days. Include tools (ex: Postman), steps (ex: intercept headers), detection (ex: plaintext tokens), & fixes (ex: rotate keys), with a PoC & a risk assessment.
COPY!
BRUTE FORCE PENTEST
Conduct a brute force pentest on an SSH server within the past 7 days. Include tools (ex: Hydra), steps (ex: 1000 attempts), detection (ex: auth logs), & mitigation (ex: rate limiting), with a sample command & a report template.
COPY!
CLOUD PENTEST PLAN
Design a pentest plan for an AWS EC2 instance within the past 30 days. Include scope (ex: public IPs), tools (ex: awscli), steps (e.g., exploit misconfigs), & remediation (ex: tighten SGs), with a sample report & compliance check for CIS AWS.
COPY!
MOBILE APP PENTEST
Perform a pentest on an Android app within the past 14 days. Include tools (ex: MobSF), steps (ex: decompile APK), detection (ex: insecure storage), & fixes (ex: encrypt data), with a PoC & a risk summary exportable to PDF.
COPY!
IoT DEVICE PENTEST
Conduct a penetration test on a smart thermostat within the past 14 days. Include tools (ex: nmap), steps (ex: scan UDP ports), detection (ex: default creds), & fixes (ex: change password), with a sample report & a risk assessment exportable to PDF.
COPY!
DNS SPOOFING TEST
Simulate a DNS spoofing attack on a local network within the past 7 days. Detail tools (ex: dnsspoof), steps (ex: redirect google.com), detection (ex: DNS logs), & mitigation (ex: DNSSEC), with a sample script & a cleanup plan.
COPY!
FILE UPLOAD VULN TEST
Test a file upload feature in a Django app for vulnerabilities within the past 14 days. Include tools (ex: Burp Suite), steps (ex: upload malicious PHP), detection (ex: shell access), & fixes (ex: validate MIME), with a PoC & a remediation guide.
COPY!
LDAP INJECTION PENTEST
Perform an LDAP injection pentest on an AD-integrated app within the past 7 days. Include tools (ex: ldapsearch), steps (ex: inject * filter), detection (ex: auth bypass), & mitigation (ex: sanitize inputs), with a sample query & a report.
COPY!
KERBEROS ATTACK SIMULATION
Simulate a Kerberos ticket attack on a Windows domain within the past 30 days. Detail tools (ex: Mimikatz), steps (ex: extract TGT), detection (ex: Event ID 4769), & mitigation (e.g., rotate krbtgt), with a sample command & a cleanup plan.
COPY!
RED TEAM EXERCISE PLAN
Design a red team exercise for a financial firm within the past 60 days. Include scope (ex: internal network), tactics (ex: phishing, pivoting), tools (ex: Cobalt Strike), & deliverables (ex: exec summary), with a timeline & a PDF report template.
COPY!
SECURITY AWARENESS
PHISHING AWARENESS PROGRAM
Develop a 1 hour phishing awareness training for new hires within the past 30 days. Include a slide deck (ex: 10 slides on email red flags), a case study (ex: 2025 PayPal scam), a live demo (ex: fake login page), & a 15 question quiz with answers, exportable to PPT.
COPY!
SOCIAL ENGINEERING INFOGRAPHIC
Create an infographic on social engineering tactics for employees within the past 14 days. Include 5 attack types (ex: pretexting), stats (ex: 30% success rate), & prevention tips (ex: verify callers), with a visual description exportable to PNG.
COPY!
96. X BREACH CASE STUDY
Summarize a high-profile breach from X posts in the past 60 days with over 200 retweets for a training session. Detail the incident (ex: 2025 retail hack), impact (ex: 1M cards stolen), & lessons (ex: patch delays), with a 5 slide PPT export.
COPY!
PASSWORD SECURITY ARTICLE
Write a 500 word article on password security best practices for employees within the past 7 days. Include tips (ex: use passphrases), examples (ex: CorrectHorseBatteryStaple), and risks (ex: reuse stats), with a Word export & references.
COPY!
INSIDER THREAT QUIZ
Design a 10 question quiz on insider threat awareness for staff within the past 14 days. Include scenarios (ex: USB use), answers (ex: report it), & explanations, with a scoring guide & a PDF export for distribution.
COPY!
SIMULATED PHISHING CAMPAIGN
Create a simulated phishing email campaign for 100 employees within the past 30 days. Include a template (ex: fake HR update), metrics (ex: click rate), follow up training (ex: 5-min video), & a report template exportable to Excel.
COPY!
REMOTE WORK SECURITY GUIDE
Develop a 2 page guide on securing remote work for employees within the past 14 days. Cover VPN use, device updates, and Wi-Fi safety, with visuals (ex: VPN setup steps) and a checklist, exportable to PDF.
COPY!
101. Data Protection Training
Design a 30-minute training on data protection for managers within the past 7 days. Include GDPR basics, handling PII, a case study (e.g., 2025 leak), and a 10-question quiz, with a PPT export and speaker notes.
COPY!
102. X Security Tips Analysis
Analyze X posts for security tips shared in the past 30 days with over 150 likes. Summarize 5 tips (e.g., enable 2FA), provide examples (e.g., tweet links), and create a 1-page handout exportable to PDF.
COPY!
103. Malware Awareness Video
Script a 5-minute video on malware awareness for staff within the past 14 days. Include types (e.g., ransomware), signs (e.g., slow PC), and prevention (e.g., avoid downloads), with a storyboard description and a text export.
COPY!
104. Physical Security Training
Develop a 45-minute training on physical security for office workers within the past 30 days. Cover tailgating, badge use, a case study (e.g., 2025 break-in), and a 12-question quiz, with a PPT export and handouts.
Copy
105. Cloud Security Basics
Write a 300-word intro to cloud security for employees within the past 7 days. Include risks (e.g., misconfigs), tips (e.g., check permissions), and examples (e.g., S3 leaks), with a Word export and a visual suggestion.
COPY!
106. Incident Reporting Guide
Create a 1-page guide on reporting security incidents for staff within the past 14 days. Detail steps (e.g., email IT), examples (e.g., suspicious link), and urgency (e.g., within 1 hour), with a PDF export and a flowchart description.
COPY!
107. VPN Usage Training
Design a 20-minute training on VPN usage for remote workers within the past 7 days. Include setup (e.g., Cisco AnyConnect), risks (e.g., public Wi-Fi), and a 5-question quiz, with a PPT export and a setup guide.
COPY!
108. BEC Scam Awareness
Develop a 15-minute awareness session on BEC scams for execs within the past 14 days. Cover signs (e.g., urgent requests), a case study (e.g., 2025 $1M loss), and prevention (e.g., verify emails), with a PPT export and a checklist.
COPY!
109. Secure Browsing Tips
Create a 1-page tip sheet on secure browsing for employees within the past 7 days. Include advice (e.g., use HTTPS), risks (e.g., fake sites), and examples (e.g., phishing URLs), with a PDF export and a visual suggestion.
COPY!
110. Mobile Device Security
Design a 30-minute training on mobile device security for staff within the past 14 days. Cover locking devices, app risks, a case study (e.g., 2025 Android breach), and a 10-question quiz, with a PPT export and a policy snippet.
COPY!
111. X Awareness Campaign
Plan an awareness campaign based on X posts about breaches in the past 60 days with over 200 retweets. Include 3 key messages (e.g., update software), delivery (e.g., posters), and metrics (e.g., quiz uptake), with a PDF plan.
COPY!
112. USB Security Training
Develop a 20-minute training on USB security risks for employees within the past 7 days. Include threats (e.g., malware drops), policies (e.g., no unknown USBs), and a 5-question quiz, with a PPT export and a visual aid.
COPY!
113. Password Manager Guide
Create a 2-page guide on using password managers for staff within the past 14 days. Detail setup (e.g., LastPass), benefits (e.g., unique passwords), and steps (e.g., generate 20 chars), with a PDF export and a screenshot suggestion.
COPY!
114. Insider Threat Infographic
Design an infographic on insider threats for employees within the past 7 days. Include stats (e.g., 34% intentional), examples (e.g., data theft), and tips (e.g., report odd behavior), with a PNG export description.
COPY!
115. Secure Email Training
Develop a 25-minute training on secure email use for staff within the past 14 days. Cover encryption (e.g., TLS), risks (e.g., attachments), a case study (e.g., 2025 BEC), and a 10-question quiz, with a PPT export.
COPY!
116. Social Media Safety
Create a 1-page guide on social media safety for employees within the past 7 days. Include tips (e.g., limit sharing), risks (e.g., OSINT), and examples (e.g., fake profiles), with a PDF export and a visual suggestion.
COPY!
NETWORK SECURITY
117. DNS Tunneling Analysis
Analyze this PCAP file uploaded here: [upload file] from a Cisco router for DNS tunneling over the past 7 days. Filter for large TXT records, extract payloads (e.g., base64), geolocate IPs, and recommend mitigation (e.g., block domains) with a Wireshark filter.
COPY!
118. Firewall Rule Audit
Audit this firewall config uploaded here: [upload file] from a Palo Alto device within the past 14 days. Check for open ports (e.g., 3389), unused rules, and logging gaps, with a revised config and a 5-step validation process.
COPY!
119. X Network Threats
Search X for network security threats posted in the past 30 days with over 100 retweets. Summarize 5 threats (e.g., VPN exploits), extract IOCs (e.g., IPs), and provide mitigation (e.g., update firmware), with a trend summary.
COPY!
120. VLAN Segmentation Guide
Generate a guide for VLAN segmentation in a corporate network within the past 14 days. Include design (e.g., VLAN 10 for guests), config (e.g., switchport access vlan 10), and validation (e.g., ping test), with a sample config and a diagram description.
COPY!
121. IDS Alert Tuning
Tune IDS alerts for a Suricata deployment based on this log uploaded here: [upload file] from the past 7 days. Adjust rules (e.g., drop false positives), test (e.g., replay PCAP), and validate (e.g., no noise), with a revised rule set.
COPY!
122. Wi-Fi Security Assessment
Assess Wi-Fi security for a WPA3 network within the past 14 days. Include tools (e.g., aircrack-ng), checks (e.g., PSK strength), findings (e.g., weak passphrase), and fixes (e.g., 20+ chars), with a report exportable to PDF.
COPY!
123. BGP Hijack Detection
Detect potential BGP hijacks in this routing table uploaded here: [upload file] from the past 30 days. Check AS paths, anomalies (e.g., new prefixes), and validate with RIPE, with a mitigation plan (e.g., RPKI) and a summary.
COPY!
124. Network Hardening Checklist
Create a 20-item checklist for hardening a network within the past 7 days. Include steps (e.g., disable Telnet), tools (e.g., nmap), and validation (e.g., port scans), with a PDF export and a compliance note for NIST 800-53.
Copy
125. VPN Config Review
Review this OpenVPN config uploaded here: [upload file] from the past 14 days. Check encryption (e.g., AES-256), auth (e.g., certs), and leaks (e.g., DNS), with a revised config and a 5-step validation process.
COPY!
126. Traffic Anomaly Report
Generate a report on traffic anomalies in this NetFlow data uploaded here: [upload file] from the past 7 days. Detail spikes (e.g., 10Gbps at 3 AM), sources (e.g., 192.168.1.100), and mitigation (e.g., rate limit), with a trend graph.
COPY!
127. X Protocol Exploits
Search X for exploits targeting network protocols in the past 60 days with over 150 likes. Summarize 5 exploits (e.g., SMBv1), extract IOCs (e.g., IPs), and provide mitigation (e.g., disable SMBv1), with a summary table.
COPY!
128. NAC Implementation
Design a network access control plan for a 500-user office within the past 14 days. Include setup (e.g., Cisco ISE), policies (e.g., block BYOD), and validation (e.g., posture checks), with a sample config and a diagram description.
COPY!
129. SSL/TLS Audit
Audit SSL/TLS settings for a web server based on this config uploaded here: [upload file] from the past 7 days. Check ciphers (e.g., no TLS 1.0), certs (e.g., expiry), and HSTS, with a revised config and a testssl.sh report.
COPY!
130. SD-WAN Security
Assess security for an SD-WAN deployment within the past 30 days. Include checks (e.g., VPN tunnels), findings (e.g., weak PSK), and fixes (e.g., IPsec), with a report exportable to PDF and a validation script.
COPY!
131. DDoS Mitigation Plan
Create a DDoS mitigation plan for a web server within the past 14 days. Include detection (e.g., Cloudflare alerts), mitigation (e.g., rate limiting), and validation (e.g., uptime checks), with a sample config and a 5-step process.
COPY!
132. Packet Sniffing Guide
Generate a guide for packet sniffing on a LAN within the past 7 days. Include tools (e.g., Wireshark), steps (e.g., capture HTTP), analysis (e.g., filter POST), and ethics (e.g., consent), with a sample filter and a PDF export.
COPY!
133. Proxy Server Config
Configure a Squid proxy server for a small office within the past 14 days. Include setup (e.g., squid.conf), rules (e.g., block .exe), and validation (e.g., access logs), with a sample config and a security checklist.
COPY!
134. Network Monitoring Setup
Set up network monitoring for a 50-node network within the past 30 days. Include tools (e.g., Zabbix), config (e.g., SNMP), alerts (e.g., >80% bandwidth), and validation (e.g., test alert), with a setup guide and a dashboard description.
COPY!
135. X DDoS Trends
Analyze X posts for DDoS attack trends in the past 60 days with over 200 retweets. Summarize 5 trends (e.g., IoT botnets), extract IOCs (e.g., IPs), and provide mitigation (e.g., BGP blackholing), with a trend summary.
COPY!
136. Firewall Log Analysis
Analyze this firewall log uploaded here: [upload file] from a Fortinet device over the past 7 days. Filter for drops (e.g., port 445), geolocate IPs, and recommend rules (e.g., block subnet), with a summary table and a mitigation plan.
COPY!
137. IPSec Tunnel Setup
Set up an IPSec tunnel between two sites within the past 14 days. Include config (e.g., strongSwan), encryption (e.g., AES-256), and validation (e.g., ping test), with a sample config and a security checklist.
COPY!
138. Traffic Shaping Plan
Create a traffic shaping plan for a 100-user network within the past 7 days. Include rules (e.g., limit streaming), tools (e.g., pfSense), and validation (e.g., bandwidth tests), with a sample config and a performance report.
COPY!
139. Network Recon Defense
Design a defense plan against network recon within the past 14 days. Include detection (e.g., honeypot), mitigation (e.g., block scans), and validation (e.g., IDS logs), with a sample setup and a PDF export.
COPY!
MALWARE ANALYSIS
140. Static Malware Analysis
Perform static analysis on this PE binary uploaded here: [upload file] using Ghidra within the past 7 days. Extract imports (e.g., CreateFile), strings (e.g., C2 URLs), and sections (e.g., .text entropy), with a behavior hypothesis (e.g., ransomware) and a disassembly snippet.
COPY!
141. Emotet Malware Dossier
Compile a dossier on Emotet malware variants from web sources like Malwarebytes in the past 30 days. Detail TTPs (e.g., macro delivery), IOCs (e.g., 10 IPs), and mitigation (e.g., disable macros), with a timeline and a PDF export.
COPY!
142. X Malware Trends
Search X for malware trends in the past 60 days with over 150 retweets. Summarize 5 strains (e.g., TrickBot), extract IOCs (e.g., hashes), and provide detection (e.g., YARA rules), with a trend summary and references.
COPY!
143. Dynamic Analysis Setup
Set up a dynamic analysis environment for a Windows trojan within the past 14 days. Include VM config (e.g., Win10, no internet), tools (e.g., Procmon), steps (e.g., run sample), and output (e.g., network calls), with a setup guide.
COPY!
144. Reverse Engineering Guide
Generate a guide to reverse-engineer an Android APK within the past 7 days using JADX. Include steps (e.g., decompile), findings (e.g., API keys), and mitigation (e.g., obfuscate), with a sample output and a PDF export.
COPY!
145. YARA Rule Creation
Create 5 YARA rules for detecting ransomware based on this sample uploaded here: [upload file] from the past 14 days. Include strings (e.g., ransom note), conditions (e.g., PE header), and testing (e.g., scan dir), with a rule file.
COPY!
146. Memory Dump Analysis
Analyze this memory dump uploaded here: [upload file] from a Windows 10 host within the past 7 days using Volatility. Extract processes (e.g., cmd.exe), injected code, and IOCs (e.g., IPs), with a behavior summary and a mitigation plan.
Copy
147. Worm Propagation Study
Study the propagation of a worm based on this PCAP uploaded here: [upload file] from the past 14 days. Detail spread (e.g., SMB exploits), payloads (e.g., binary drop), and mitigation (e.g., block 445), with a Wireshark analysis.
COPY!
148. Rootkit Detection Guide
Create a guide to detect rootkits on a Linux server within the past 7 days. Include tools (e.g., chkrootkit), steps (e.g., check lsmod), and validation (e.g., clean scan), with a sample output and a PDF export.
COPY!
149. X Botnet IOCs
Harvest IOCs from X posts about botnets in the past 30 days with over 100 likes. Extract 10 IOCs (e.g., C2 domains), validate with VirusTotal, and provide mitigation (e.g., blocklist), with a summary table.
COPY!
150. Packer Identification
Identify packers in this binary uploaded here: [upload file] from the past 7 days using PEiD. Detail findings (e.g., UPX v3.95), unpacking steps (e.g., upx -d), and analysis (e.g., strings), with a sample output and a report.
COPY!
151. Adware Analysis
Analyze this adware sample uploaded here: [upload file] from a Windows host within the past 14 days. Detail behavior
151. Adware Analysis
Analyze this adware sample uploaded here: [upload file] from a Windows host within the past 14 days. Detail behavior (e.g., browser redirects), persistence (e.g., registry keys), and removal (e.g., delete HKLM\Software\Adware), with a sandbox log and a mitigation plan.
COPY!
152. Cryptominer Detection
Detect a cryptominer in this process list uploaded here: [upload file] from the past 7 days. Identify signs (e.g., XMRig process), network calls (e.g., stratum protocol), and mitigation (e.g., kill PID), with a task manager screenshot and a removal script.
COPY!
153. Obfuscated JS Analysis
Deobfuscate this JavaScript file uploaded here: [upload file] from the past 14 days. Decode methods (e.g., eval packing), extract payloads (e.g., C2 URL), and assess intent (e.g., downloader), with a deobfuscated snippet and a behavior summary.
COPY!
154. X Ransomware Insights
Analyze X posts for ransomware insights from the past 30 days with over 200 retweets. Summarize 5 campaigns (e.g., LockBit), extract IOCs (e.g., 10 hashes), and provide mitigation (e.g., backups), with a trend summary and references.
COPY!
155. Backdoor Analysis
Analyze this backdoor binary uploaded here: [upload file] from the past 7 days using IDA Pro. Extract C2 (e.g., 192.168.1.200:4444), commands (e.g., shell exec), and persistence (e.g., startup), with a disassembly excerpt and a removal guide.
COPY!
EXPLOIT KIT BREAKDOWN
Break down this exploit kit sample uploaded here: [upload file] from the past 14 days. Detail exploits (e.g., CVE-2025-1234), delivery (e.g., malvertising), and payloads (e.g., trojan), with a sandbox log and a mitigation plan for browsers.
COPY!
1LSPYWARE TRAFFIC ANALYSIS
Analyze this PCAP of spyware traffic uploaded here: [upload file] from the past 7 days. Filter for exfil (e.g., HTTP POST), decode payloads (e.g., keylogs), and recommend blocks (e.g., 10 IPs), with a Wireshark screenshot and a summary.
COPY!
158. DROPPER DISSECTION
Dissect this dropper executable uploaded here: [upload file] from the past 14 days. Extract payload (e.g., via strings), monitor drops (e.g., %temp%\malware.exe), and assess intent (e.g., stage 2), with a runtime log and a cleanup script.
COPY!
159. X MALWARE TOOLS
Curate 5 malware analysis tools from X posts in the past 30 days with over 100 likes. Include tools (e.g., Cutter), use cases (e.g., decompile), and tips (e.g., set breakpoints), with a summary table and download links.
COPY!
160. POLYMORPHIC MALWARE STUDY
Study this polymorphic malware sample uploaded here: [upload file] from the past 14 days. Analyze mutations (e.g., code shifts), detect via behavior (e.g., file encryption), and recommend AV rules, with a mutation log and a mitigation plan.
COPY!
161. Banking Trojan Report
Compile a report on banking trojans from web sources like Kaspersky in the past 30 days. Detail TTPs (e.g., web injects), IOCs (e.g., 12 domains), and mitigation (e.g., update browsers), with a trend chart and a PDF export.
COPY!
162. Keylogger Analysis
Analyze this keylogger sample uploaded here: [upload file] from the past 7 days. Monitor keystrokes (e.g., via VM), extract exfil (e.g., FTP), and assess persistence (e.g., reg add), with a behavior log and a removal guide.
COPY!
COMPLIANCE & RISK MANAGEMENT
163. GDPR Compliance Audit
Audit GDPR compliance for an e-commerce site within the past 30 days. Include 15 controls (e.g., consent forms), evidence (e.g., logs), gaps (e.g., no DPIA), and remediation (e.g., update policy), with an Excel checklist and a summary.
COPY!
164. PCI DSS GAP ANALYSIS
Perform a PCI DSS gap analysis based on this report uploaded here: [upload file] from the past 14 days. Detail gaps (e.g., no quarterly scans), compliance (e.g., 75%), and fixes (e.g., ASV scan), with a 30-day plan and a summary.
COPY!
X COMPLIANCE FINES
Search X for compliance fines in the past 60 days with over 150 retweets. Summarize 5 cases (e.g., HIPAA $1M fine), causes (e.g., no encryption), and lessons (e.g., audit logs), with a summary table and references.
COPY!
NIST 800-53 MAPPING
Map 10 NIST 800-53 controls to a cloud app within the past 30 days. Include controls (e.g., AU-2), implementation (e.g., Splunk logs), and validation (e.g., audit trail), with an Excel matrix and a compliance summary.
COPY!
RISK ASSESSMENT REPORT
Generate a risk assessment report for a SaaS platform within the past 14 days. Detail 5 risks (e.g., data breach), scores (e.g., 8/10), mitigation (e.g., encrypt), and validation (e.g., test recovery), with a Word export and a heatmap.
COPY!
ISO 27001 CHECKLIST
Create an ISO 27001 checklist for a small business within the past 7 days. Include 20 controls (e.g., A.12.4.1), evidence (e.g., logs), and gaps (e.g., no training), with a PDF export and an audit prep guide.
COPY!
HIPAA COMPLIANCE REVIEW
Review HIPAA compliance based on this audit uploaded here: [upload file] from the past 14 days. Detail gaps (e.g., no PHI encryption), fixes (e.g., use AES-256), and validation (e.g., test access), with a 30-day plan and a summary.
COPY!
170. THIRD-PARTY RISK PLAN
Develop a third-party risk plan for vendors within the past 30 days. Include assessment (e.g., SOC2 review), risks (e.g., supply chain), mitigation (e.g., SLAs), and validation (e.g., audits), with a Word export and a checklist.
COPY!
X Risk Trends
Analyze X posts for risk management trends in the past 60 days with over 100 likes. Summarize 5 trends (e.g., cloud risks), strategies (e.g., zero trust), and tools (e.g., Qualys), with a summary table and references.
COPY!
172. SOC 2 PREP
Prepare for a SOC 2 audit for a tech startup within the past 14 days. Include 10 controls (e.g., CC6.1), evidence (e.g., access logs), gaps (e.g., no MFA), and fixes (e.g., enforce 2FA), with an Excel tracker and a summary.
COPY!
173. CCPA COMPLIANCE GUIDE
Create a CCPA compliance guide for a retail site within the past 7 days. Include requirements (e.g., opt-out), steps (e.g., update privacy page), and validation (e.g., test link), with a PDF export and a compliance checklist.
COPY!
174. RISK REGISTER TEMPLATE
Design a risk register template for an IT project within the past 14 days. Include fields (e.g., risk ID, impact), sample entries (e.g., DDoS, 4/5), and mitigation (e.g., WAF), with an Excel export and a usage guide.
COPY!
175. NIST CSF ASSESSMENT
Assess a network against NIST CSF within the past 30 days. Include 10 functions (e.g., ID.AM-1), maturity (e.g., Tier 2), gaps (e.g., no inventory), and fixes (e.g., asset DB), with a Word export and a maturity chart.
COPY!
VENDOR RISK REPORT
Generate a vendor risk report based on this data uploaded here: [upload file] from the past 14 days. Detail risks (e.g., no SOC2), scores (e.g., 7/10), mitigation (e.g., audit), and validation (e.g., evidence), with a PDF export.
COPY!
177. X COMPLIANCE TOOLS
Curate 5 compliance tools from X posts in the past 30 days with over 100 retweets. Include tools (e.g., OneTrust), use cases (e.g., GDPR), and benefits (e.g., automation), with a summary table and references.
COPY!
CIS BENCHMARK AUDIT
Audit a Windows server against CIS benchmarks within the past 7 days. Include 10 controls (e.g., 2.2.1), compliance (e.g., 80%), gaps (e.g., no password policy), and fixes (e.g., GPO), with an Excel export and a summary.
COPY!
DATA BREACH RESPONSE
Create a data breach response plan for a healthcare firm within the past 14 days. Include steps (e.g., notify regulator), timeline (e.g., 72 hours), and validation (e.g., test notify), with a Word export and a checklist.
Copy
180. RISK MITIGATION PLAN
Develop a risk mitigation plan for a cloud app within the past 30 days. Include 5 risks (e.g., misconfig), mitigation (e.g., IAM review), and validation (e.g., Config check), with a PDF export and a priority list.
COPY!
181. FedRAMP COMPLIANCE
Assess FedRAMP compliance for a SaaS app within the past 14 days. Include 10 controls (e.g., AC-2), evidence (e.g., logs), gaps (e.g., no FIPS), and fixes (e.g., FIPS mode), with an Excel tracker and a summary.
COPY!
182. X RISK CASE STUDY
Analyze a risk case study from X posts in the past 60 days with over 200 likes. Detail incident (e.g., 2025 supply chain), impact (e.g., $2M), and lessons (e.g., vendor audits), with a summary and references.
COPY!
PRIVACY IMPACT ASSESSMENT
Conduct a PIA for a CRM deployment within the past 7 days. Include data flows (e.g., customer DB), risks (e.g., leaks), mitigation (e.g., encrypt), and validation (e.g., test), with a Word export and a risk matrix.
COPY!
COMPLIANCE DASHBOARD
Design a compliance dashboard for a finance firm within the past 14 days. Include metrics (e.g., PCI status), visuals (e.g., pie chart), and data sources (e.g., audit logs), with an Excel mockup and a description.
COPY!
RISK POLICY TEMPLATE plate
Create a risk policy template for an SME within the past 7 days. Include sections (e.g., scope, roles), rules (e.g., annual reviews), and enforcement (e.g., audits), with a Word export and a sample policy.
COPY!
FORENSICS & INVESTIGATIONS
186. Disk Image Analysis
Analyze this disk image uploaded here: [upload file] from the past 7 days using Autopsy. Extract deleted files (e.g., logs), timelines (e.g., access times), and IOCs (e.g., malware hashes), with a case report and a PDF export.
COPY!
187. Memory Forensics Guide
Create a guide for memory forensics on a Windows 10 host within the past 14 days. Include tools (e.g., Volatility), steps (e.g., dump RAM), and analysis (e.g., process list), with a sample output and a PDF export.
COPY!
188. X Breach Investigation
Investigate a breach from X posts in the past 30 days with over 200 retweets. Detail evidence (e.g., IOCs from posts), timeline (e.g., March 15 attack), and findings (e.g., phishing), with a summary and references.
COPY!
189. Log File Analysis
Analyze this log file uploaded here: [upload file] from a Linux server within the past 7 days. Filter for anomalies (e.g., failed logins), reconstruct events (e.g., brute force), and extract IOCs (e.g., IPs), with a timeline and a report.
COPY!
190. Network Forensic Report
Generate a network forensic report from this PCAP uploaded here: [upload file] from the past 14 days. Detail traffic (e.g., DNS exfil), IOCs (e.g., 10 domains), and findings (e.g., C2), with a Wireshark screenshot and a PDF export.
COPY!
191. File Carving Guide
Create a file carving guide for a forensic image within the past 7 days. Include tools (e.g., Foremost), steps (e.g., recover JPGs), and validation (e.g., file integrity), with a sample command and a PDF export.
COPY!
192. Insider Threat Investigation
Investigate an insider threat based on this log uploaded here: [upload file] from the past 14 days. Detail evidence (e.g., USB logs), timeline (e.g., March 20 exfil), and findings (e.g., data theft), with a report and a legal note.
COPY!
193. X Forensic Tools
Curate 5 forensic tools from X posts in the past 30 days with over 100 likes. Include tools (e.g., EnCase), use cases (e.g., disk analysis), and tips (e.g., chain of custody), with a summary table and references.
COPY!
194. Registry Analysis
Analyze this Windows registry hive uploaded here: [upload file] from the past 7 days. Extract keys (e.g., Run), timestamps (e.g., last write), and IOCs (e.g., malware entries), with a RegRipper output and a summary.
COPY!
195. Mobile Forensic Report
Generate a forensic report for this Android backup uploaded here: [upload file] from the past 14 days. Detail SMS, apps (e.g., WhatsApp), and timelines (e.g., March 18 call), with a Cellebrite screenshot and a PDF export.
COPY!
196. Email Header Analysis
Analyze this email header uploaded here: [upload file] from the past 7 days. Trace IPs (e.g., 192.168.1.1), check SPF/DKIM, and assess spoofing (e.g., forged From), with a hop-by-hop breakdown and a verdict.
COPY!
197. Timeline Reconstruction
Reconstruct a timeline from this forensic data uploaded here: [upload file] from the past 14 days. Include events (e.g., file access), sources (e.g., logs), and sequence (e.g., March 19 login), with a visual timeline and a PDF export.
COPY!
198. X Incident Response
Analyze an incident response from X posts in the past 60 days with over 150 retweets. Detail steps (e.g., containment), tools (e.g., Splunk), and outcomes (e.g., mitigated), with a summary table and references.
COPY!
199. Browser Artifact Analysis
Analyze browser artifacts from this Chrome profile uploaded here: [upload file] from the past 7 days. Extract history (e.g., phishing URLs), cookies (e.g., session IDs), and downloads, with a summary and a mitigation plan.
COPY!
200. Cloud Forensic Guide
Create a cloud forensic guide for AWS within the past 14 days. Include steps (e.g., pull CloudTrail), tools (e.g., AWS CLI), and analysis (e.g., API calls), with a sample command and a PDF export.
COPY!
201. Malware Artifact Report
Generate a report on malware artifacts from this disk image uploaded here: [upload file] from the past 7 days. Detail files (e.g., %temp%\mal.exe), registry (e.g., Run key), and IOCs (e.g., hashes), with a PDF export.
COPY!
202. USB Forensic Analysis
Analyze USB usage from this registry dump uploaded here: [upload file] from the past 14 days. Extract devices (e.g., VID_1234), timestamps (e.g., March 20 connect), and findings (e.g., data exfil), with a summary and a report.
COPY!
203. X Forensic Techniques
Curate 5 forensic techniques from X posts in the past 30 days with over 100 likes. Include methods (e.g., live analysis), tools (e.g., FTK), and tips (e.g., volatile data), with a summary table and references.
COPY!
204. File System Analysis
Analyze this NTFS image uploaded here: [upload file] from the past 7 days using TSK. Extract MFT entries, deleted files (e.g., docs), and timestamps (e.g., March 21 delete), with a summary and a PDF export.
COPY!
205. Network Intrusion Forensics
Investigate a network intrusion from this Zeek log uploaded here: [upload file] from the past 14 days. Detail connections (e.g., 192.168.1.1:4444), payloads (e.g., shellcode), and IOCs (e.g., domains), with a report and a timeline.
COPY!
206. Live System Forensics
Create a guide for live forensics on a Linux host within the past 7 days. Include tools (e.g., lsof), steps (e.g., dump memory), and validation (e.g., hash evidence), with a sample script and a PDF export.
COPY!
207. Email Forensic Report
Generate an email forensic report from this PST file uploaded here: [upload file] from the past 14 days. Detail messages (e.g., phishing), attachments (e.g., malware), and headers (e.g., spoofed), with a summary and a PDF export.
COPY!
208. Chain of Custody Form
Design a chain of custody form for a forensic case within the past 7 days. Include fields (e.g., evidence ID, handler), sample (e.g., USB_001), and instructions (e.g., sign), with a Word export and a usage guide.
COPY!
OSINT
209. X Profile Investigation
Investigate the X profile @CyberThreatX for OSINT within the past 30 days. Analyze posts (e.g., malware mentions), followers (e.g., bot patterns), and links (e.g., sinkholes), with a risk score (e.g., 7/10) and a summary.
COPY!
210. Domain OSINT Report
Generate an OSINT report on the domain evilcorp.com within the past 14 days. Include WHOIS (e.g., reg date), DNS (e.g., MX records), and web content (e.g., phishing), with a summary and a PDF export.
COPY!
211. X Threat Actor Tracking
Track a threat actor on X based on posts in the past 60 days with over 200 retweets. Detail aliases (e.g., DarkLord), TTPs (e.g., phishing), and IOCs (e.g., 10 IPs), with a timeline and a summary table.
COPY!
212. Social Media OSINT Guide
Create a guide for OSINT on social media within the past 7 days. Include platforms (e.g., LinkedIn), techniques (e.g., keyword search), and tools (e.g., Maltego), with a sample case and a PDF export.
COPY!
213. Dark Web Leak Check
Check for leaks mentioning acme.com on the dark web within the past 30 days using web sources. Detail findings (e.g., 500 creds), sources (e.g., paste sites), and validation (e.g., HIBP), with a summary and a report.
COPY!
214. IP Geolocation Analysis
Analyze the IP 192.168.1.100 for OSINT within the past 14 days. Include geolocation (e.g., MaxMind), abuse reports (e.g., Spamhaus), and context (e.g., VPN), with a summary and a map description.
COPY!
215. X OSINT Tools
Curate 5 OSINT tools from X posts in the past 30 days with over 100 likes. Include tools (e.g., SpiderFoot), use cases (e.g., domain recon), and tips (e.g., automate), with a summary table and references.
COPY!
216. Company OSINT Profile
Profile Acme Corp via OSINT within the past 14 days. Include web data (e.g., site tech), social (e.g., X posts), and leaks (e.g., pastebin), with a risk assessment (e.g., 6/10) and a PDF export.
COPY!
217. Email OSINT Investigation
Investigate the email john.doe@acme.com for OSINT within the past 7 days. Check breaches (e.g., HIBP), social (e.g., LinkedIn), and domains (e.g., WHOIS), with a summary and a risk profile.
COPY!
218. X Cybercrime Trends
Analyze X posts for cybercrime trends in the past 60 days with over 150 retweets. Summarize 5 trends (e.g., BEC spikes), examples (e.g., $1M loss), and sources, with a trend summary and a table.
COPY!
219. Pastebin Leak Search
Search Pastebin for leaks mentioning acme.com within the past 14 days. Detail findings (e.g., 10 passwords), context (e.g., sale post), and validation (e.g., hash check), with a summary and a report.
COPY!
220. Image OSINT Analysis
Analyze this image uploaded here: [upload file] for OSINT within the past 7 days. Extract EXIF (e.g., GPS coords), context (e.g., landmarks), and sources (e.g., reverse search), with a summary and a map.
COPY!
221. Threat Actor Alias Map
Map aliases for a threat actor from web sources within the past 30 days. Include names (e.g., APT28, Fancy Bear), campaigns (e.g., 2025 hack), and IOCs (e.g., 5 IPs), with a diagram description and a PDF export.
COPY!
222. X Malware Markets
Investigate malware markets from X posts in the past 60 days with over 100 retweets. Detail offerings (e.g., RATs), prices (e.g., $50), and sellers (e.g., aliases), with a summary table and references.
COPY!
223. Phone Number OSINT
Perform OSINT on the number +1-555-123-4567 within the past 14 days. Check registrations (e.g., Twilio), social (e.g., X mentions), and breaches, with a summary and a risk profile.
COPY!
224. Geopolitical Cyber Threats
Analyze geopolitical cyber threats from web sources within the past 30 days. Detail actors (e.g., nation-states), targets (e.g., energy), and TTPs (e.g., zero-days), with a summary and a PDF export.
COPY!
225. X Hacktivist Activity
Track hacktivist activity on X in the past 60 days with over 200 likes. Detail groups (e.g., Anonymous), actions (e.g., defacement), and motives (e.g., protest), with a timeline and a summary table.
COPY!
226. Website Tech Stack
Profile the tech stack of acme.com within the past 14 days using Wappalyzer. Detail tech (e.g., Apache 2.4), versions (e.g., PHP 7.4), and risks (e.g., outdated), with a summary and a report.
COPY!
227. OSINT Workflow Template
Create an OSINT workflow template within the past 7 days. Include steps (e.g., collect, analyze), tools (e.g., Recon-ng), and outputs (e.g., report), with a Word export and a sample case.
COPY!
228. X Insider Threat OSINT
Investigate insider threats from X posts in the past 30 days with over 100 retweets. Detail cases (e.g., data leaks), actors (e.g., ex-employees), and IOCs (e.g., emails), with a summary and references.
COPY!
229. Cryptocurrency Tracking
Track the BTC address 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa for OSINT within the past 14 days. Detail transactions (e.g., 0.5 BTC), wallets (e.g., exchanges), and context (e.g., ransomware), with a summary and a blockchain link.
COPY!
230. OSINT Threat Report
Generate an OSINT threat report for a bank within the past 30 days. Include sources (e.g., X, dark web), threats (e.g., phishing), and IOCs (e.g., 10 domains), with a PDF export and a risk matrix.
COPY!
231. Persona Mapping
Map a persona for John Doe via OSINT within the past 14 days. Include social (e.g., X @johndoe), work (e.g., LinkedIn), and leaks (e.g., HIBP), with a summary and a profile diagram description.
COPY!
232. X Disinformation Analysis
Analyze X posts for disinformation campaigns in the past 30 days with over 150 retweets. Detail narratives (e.g., fake breach), actors (e.g., bots), and spread (e.g., 10K reach), with a summary and a trend chart.
COPY!
233. Forum OSINT Report
Generate an OSINT report from a hacking forum like RaidForums within the past 14 days. Include threads (e.g., data sales), users (e.g., aliases), and IOCs (e.g., 5 IPs), with a summary and a PDF export.
COPY!
234. Username Correlation
Correlate the username 'DarkHacker' across platforms within the past 7 days. Check X, GitHub, and Reddit for posts, with a summary of activity (e.g., malware dev) and a profile linkage map.
COPY!
235. X Phishing Campaigns
Track phishing campaigns on X in the past 60 days with over 200 likes. Detail lures (e.g., fake login), domains (e.g., 10 URLs), and mitigation (e.g., report), with a summary table and references.
COPY!
236. Satellite Imagery OSINT
Analyze satellite imagery from Google Earth for a location within the past 14 days. Detail coords (e.g., 40.7128° N), changes (e.g., new structure), and context (e.g., event), with a summary and a map.
COPY!
237. Corporate Leak Check
Search for corporate leaks mentioning xyzcorp.com on paste sites within the past 30 days. Detail findings (e.g., 100 emails), sources (e.g., Pastebin), and validation (e.g., HIBP), with a summary and a report.
COPY!
238. X Cyber Threat Alerts
Compile cyber threat alerts from X posts in the past 60 days with over 100 retweets. Include 5 threats (e.g., zero-day), sources (e.g., @CyberSec), and IOCs (e.g., hashes), with a summary table.
COPY!
239. OSINT Risk Assessment
Assess OSINT risks for a CEO within the past 14 days. Include exposure (e.g., X posts), leaks (e.g., email breach), and mitigation (e.g., scrub data), with a risk score (e.g., 8/10) and a PDF export.
COPY!
240. Telegram OSINT Guide
Create an OSINT guide for Telegram within the past 7 days. Include steps (e.g., join groups), tools (e.g., Telepathy), and analysis (e.g., member lists), with a sample case and a PDF export.
COPY!
241. X Hack Tools
Curate 5 hacking tools from X posts in the past 30 days with over 150 likes. Include tools (e.g., Metasploit), uses (e.g., exploit dev), and risks (e.g., misuse), with a summary table and references.
COPY!
242. DNS History Analysis
Analyze the DNS history of hackme.com within the past 14 days using SecurityTrails. Detail IPs (e.g., 192.168.1.1), changes (e.g., new A record), and context (e.g., sinkhole), with a summary and a timeline.
COPY!
243. X Data Breach Rumors
Investigate data breach rumors on X in the past 60 days with over 200 retweets. Detail claims (e.g., 1M records), evidence (e.g., paste links), and validation (e.g., company denial), with a summary and references.
COPY!
244. LinkedIn OSINT Profile
Profile a target via LinkedIn OSINT within the past 7 days. Include job history (e.g., Acme Corp), connections (e.g., 500+), and risks (e.g., oversharing), with a summary and a profile export.
COPY!
245. OSINT Threat Map
Create a threat map from OSINT data within the past 30 days. Include sources (e.g., X, web), threats (e.g., ransomware), and geolocs (e.g., US), with a map description and a PDF export.
COPY!
246. X Cyber Events
Track cyber events on X in the past 60 days with over 100 likes. Detail 5 events (e.g., DEF CON), dates (e.g., March 20), and takeaways (e.g., new vuln), with a summary table and references.
COPY!
247. Web Archive Analysis
Analyze archive.org snapshots of xyzcorp.com within the past 14 days. Detail changes (e.g., new login page), dates (e.g., March 15), and context (e.g., breach), with a summary and a timeline.
COPY!
248. X Malware IOCs
Harvest malware IOCs from X posts in the past 30 days with over 150 retweets. Extract 10 IOCs (e.g., SHA256 hashes), validate (e.g., VirusTotal), and provide a blocklist, with a summary table.
COPY!
249. GitHub OSINT Search
Search GitHub for OSINT on Acme Corp within the past 7 days. Detail repos (e.g., config leaks), commits (e.g., API keys), and risks (e.g., exposure), with a summary and a report.
COPY!
250. X Cyber Policy
Analyze X posts for cyber policy discussions in the past 60 days with over 200 likes. Summarize 5 topics (e.g., GDPR fines), opinions (e.g., too strict), and sources, with a summary and references.
COPY!
251. Shodan Device Scan
Scan Shodan for devices on 192.168.1.0/24 within the past 14 days. Detail findings (e.g., open 3389), risks (e.g., RDP vuln), and mitigation (e.g., close ports), with a summary and a report.
COPY!
252. X Insider Leaks
Investigate insider leaks on X in the past 30 days with over 100 retweets. Detail leaks (e.g., internal docs), actors (e.g., ex-staff), and impact (e.g., stock drop), with a summary and references.
COPY!
253. OSINT Timeline Tool
Create a timeline tool for OSINT events within the past 7 days. Include steps (e.g., scrape X), tools (e.g., TimelineJS), and output (e.g., breach timeline), with a Word export and a sample.
COPY!
254. X Threat Intel Feed
Build a threat intel feed from X posts in the past 60 days with over 150 likes. Include 10 threats (e.g., exploits), IOCs (e.g., IPs), and sources, with a summary table and a CSV export.
COPY!
255. Censys IoT Scan
Scan Censys for IoT devices in a city within the past 14 days. Detail findings (e.g., 50 cameras), protocols (e.g., RTSP), and risks (e.g., defaults), with a summary and a report.
COPY!
256. X Cyber Jobs
Analyze X posts for cyber job trends in the past 30 days with over 100 likes. Summarize 5 roles (e.g., pentester), skills (e.g., Python), and demand (e.g., high), with a summary and references.
COPY!
257. OSINT Source List
Compile a list of 20 OSINT sources within the past 7 days. Include sites (e.g., HIBP), uses (e.g., breach check), and reliability (e.g., high), with a Word export and a table.
COPY!
258. X OSINT Case Study
Develop an OSINT case study from X posts in the past 60 days with over 200 retweets. Detail target (e.g., scam site), methods (e.g., domain lookup), and findings (e.g., 10 IOCs), with a summary and a PDF export.
COPY!
259. IR Plan Template
Create an incident response plan template within the past 14 days. Include phases (e.g., prep, containment), roles (e.g., IR lead), and steps (e.g., isolate), with a Word export and a sample scenario.
COPY!
260. Ransomware Response
Develop a response plan for a ransomware attack within the past 7 days. Detail steps (e.g., disconnect, restore), tools (e.g., backups), and validation (e.g., clean scan), with a PDF export and a checklist.
COPY!
261. X Incident Reports
Analyze X posts for incident reports in the past 30 days with over 150 retweets. Summarize 5 incidents (e.g., DDoS), responses (e.g., mitigated), and lessons (e.g., monitor), with a summary and references.
COPY!
262. Phishing IR Guide
Create a guide for responding to phishing within the past 14 days. Include steps (e.g., reset creds), tools (e.g., Splunk), and validation (e.g., no reuse), with a Word export and a flowchart.
COOY!
263. Log Review IR
Review this log uploaded here: [upload file] for an incident within the past 7 days. Detail anomalies (e.g., 100 logins), response (e.g., block IP), and findings (e.g., brute force), with a summary and a report.
COPY!
264. DDoS Response Plan
Plan a response to a DDoS attack within the past 14 days. Include detection (e.g., traffic spike), mitigation (e.g., Cloudflare), and validation (e.g., uptime), with a PDF export and a timeline.
COPY!
265. X IR Tools
Curate 5 IR tools from X posts in the past 30 days with over 100 likes. Include tools (e.g., TheHive), uses (e.g., case mgmt), and tips (e.g., integrate), with a summary table and references.
COPY!
266. Data Breach IR
Develop a data breach IR plan within the past 7 days. Include steps (e.g., notify regulator), timeline (e.g., 72 hrs), and validation (e.g., test notify), with a Word export and a checklist.
COPY!
267. Malware IR Report
Generate an IR report for malware from this sample uploaded here: [upload file] within the past 14 days. Detail containment (e.g., isolate), eradication (e.g., remove), and recovery (e.g., restore), with a PDF export.
COPY!
268. X Ransomware Lessons
Analyze ransomware lessons from X posts in the past 60 days with over 200 retweets. Summarize 5 cases (e.g., $1M ransom), responses (e.g., paid), and takeaways (e.g., backups), with a summary and references.
COPY!
269. Insider Threat IR
Plan an IR for an insider threat within the past 14 days. Include detection (e.g., DLP alert), containment (e.g., suspend access), and legal steps (e.g., notify HR), with a PDF export and a timeline.
COPY!
270. Network Intrusion IR
Respond to a network intrusion based on this PCAP uploaded here: [upload file] from the past 7 days. Detail containment (e.g., block IPs), analysis (e.g., C2 traffic), and recovery (e.g., patch), with a report.
COPY!
271. X IR Case Study
Develop an IR case study from X posts in the past 30 days with over 150 likes. Detail incident (e.g., phishing), response (e.g., reset), and outcome (e.g., contained), with a summary and a PDF export.
COPY!
272. Cloud IR Guide
Create a cloud IR guide for AWS within the past 14 days. Include steps (e.g., check CloudTrail), tools (e.g., GuardDuty), and validation (e.g., no alerts), with a Word export and a checklist.
COPY!
273. BEC IR Plan
Plan an IR for a BEC scam within the past 7 days. Include detection (e.g., fake invoice), containment (e.g., freeze funds), and recovery (e.g., notify bank), with a PDF export and a timeline.
COPY!
274. X DDoS Response
Analyze DDoS responses from X posts in the past 60 days with over 100 retweets. Summarize 5 cases (e.g., 10Gbps attack), mitigation (e.g., BGP), and lessons (e.g., prep), with a summary and references.
COPY!
275. Post-Incident Review
Create a post-incident review template within the past 14 days. Include sections (e.g., timeline, root cause), sample (e.g., phishing breach), and actions (e.g., train), with a Word export.
COPY!
276. IR Playbook
Develop an IR playbook for malware within the past 7 days. Include scenarios (e.g., ransomware), steps (e.g., isolate), and tools (e.g., EDR), with a PDF export and a checklist.
COPY!
277. X IR Best Practices
Curate 5 IR best practices from X posts in the past 30 days with over 150 likes. Include tips (e.g., log all), tools (e.g., SIEM), and benefits (e.g., speed), with a summary table and references.
COPY!
278. APT IR Strategy
Plan an IR strategy for an APT within the past 14 days. Include detection (e.g., anomaly), containment (e.g., segment), and eradication (e.g., hunt), with a PDF export and a timeline.
COPY!
279. IR Drill Plan
Create an IR drill plan within the past 7 days. Include scenario (e.g., data leak), steps (e.g., simulate), and metrics (e.g., response time), with a Word export and a debrief template.
COPY!
280. X Breach Response
Analyze breach responses from X posts in the past 60 days with over 200 retweets. Summarize 5 cases (e.g., 1M records), actions (e.g., notify), and outcomes (e.g., fined), with a summary and references.
COPY!
281. IoT Incident Response
Plan an IR for an IoT compromise within the past 14 days. Include detection (e.g., traffic), containment (e.g., VLAN), and recovery (e.g., firmware), with a PDF export and a checklist.
COPY!
282. IR Timeline Analysis
Analyze this IR timeline uploaded here: [upload file] from the past 7 days. Detail events (e.g., alert at 10:00), gaps (e.g., 2hr delay), and fixes (e.g., automate), with a summary and a report.
COPY!
283. X IR Automation
Curate 5 IR automation tips from X posts in the past 30 days with over 100 likes. Include tools (e.g., SOAR), uses (e.g., triage), and benefits (e.g., speed), with a summary table and references.
COPY!
284. Credential Leak IR
Plan an IR for a credential leak within the past 14 days. Include detection (e.g., HIBP), containment (e.g., reset), and recovery (e.g., MFA), with a PDF export and a checklist.
COPY!
285. IR Metrics Dashboard
Create an IR metrics dashboard within the past 7 days. Include metrics (e.g., MTTR), visuals (e.g., bar chart), and sources (e.g., logs), with an Excel mockup and a description.
COPY!
286. X IR Failures
Analyze IR failures from X posts in the past 60 days with over 150 retweets. Summarize 5 cases (e.g., slow response), causes (e.g., no plan), and fixes (e.g., train), with a summary and references.
COOY!
287. Physical Breach IR
Plan an IR for a physical breach within the past 14 days. Include detection (e.g., CCTV), containment (e.g., lock doors), and recovery (e.g., audit), with a PDF export and a timeline.
COPY!
288. IR Communication Plan
Create an IR communication plan within the past 7 days. Include audiences (e.g., staff), messages (e.g., update), and channels (e.g., email), with a Word export and a sample.
COPY!
289. X IR Training
Curate 5 IR training tips from X posts in the past 30 days with over 100 likes. Include tips (e.g., tabletop), tools (e.g., Sims), and benefits (e.g., prep), with a summary table and references.
COPY!
290. Zero Day IR
Plan an IR for a zero-day exploit within the past 14 days. Include detection (e.g., IDS), containment (e.g., patch), and recovery (e.g., monitor), with a PDF export and a checklist.
COPY!
291. IR Evidence Collection
Create an evidence collection guide for IR within the past 7 days. Include steps (e.g., hash files), tools (e.g., FTK), and validation (e.g., chain), with a Word export and a checklist.
COOY!
292. X IR Success Stories
Analyze IR success stories from X posts in the past 60 days with over 200 likes. Summarize 5 cases (e.g., fast recovery), strategies (e.g., SOAR), and lessons, with a summary and references.
COPY!
293. Mobile Device IR
Plan an IR for a mobile device breach within the past 14 days. Include detection (e.g., MDM alert), containment (e.g., wipe), and recovery (e.g., restore), with a PDF export and a timeline.
COPY!
294. IR Root Cause Analysis
Perform a root cause analysis for this incident uploaded here: [upload file] from the past 7 days. Detail cause (e.g., unpatched), impact (e.g., data loss), and fixes (e.g., update), with a summary and a report.
COPY!
295. X IR Metrics
Curate 5 IR metrics from X posts in the past 30 days with over 100 retweets. Include metrics (e.g., time to detect), uses (e.g., improve), and tools (e.g., SIEM), with a summary table and references.
COPY!
296. Supply Chain IR
Plan an IR for a supply chain attack within the past 14 days. Include detection (e.g., vendor alert), containment (e.g., isolate), and recovery (e.g., audit), with a PDF export and a checklist.
COPY!
297. IR Escalation Plan
Create an IR escalation plan within the past 7 days. Include triggers (e.g., major breach), contacts (e.g., CISO), and steps (e.g., brief), with a Word export and a sample.
COPY!
298. X IR Challenges
Analyze IR challenges from X posts in the past 60 days with over 150 likes. Summarize 5 issues (e.g., staffing), impacts (e.g., delay), and fixes (e.g., automate), with a summary and references.
COPY!
299. Legal IR Prep
Prepare an IR plan for legal compliance within the past 14 days. Include steps (e.g., log evidence), laws (e.g., GDPR), and validation (e.g., audit), with a PDF export and a checklist.
COPY!
300. IR After-Action Report
Generate an after-action report for this incident uploaded here: [upload file] from the past 7 days. Detail response (e.g., contained), lessons (e.g., faster alerts), and actions (e.g., train), with a summary and a PDF export.
COPY!