Think Like an Attacker, Defend Like a Pro
Security teams are outnumbered 100:1 by developers shipping code. These 50 prompts give every security professional — from junior SOC analysts to senior pentesters — a systematic methodology for threat modeling, vulnerability assessment, and incident response that would normally require years of experience to develop.
Every prompt uses chain-of-thought reasoning to walk through attack scenarios step-by-step, self-consistency checks for vulnerability validation, and CRTSE framework for precise, actionable security analysis. Variables like {{application_type}}, {{threat_actor}}, {{compliance_standard}}, and {{severity_threshold}} ensure relevant, contextual output.
What's Inside — 50 Expert Prompts
- STRIDE Threat Model Builder — Systematic threat modeling for {{application}} using Spoofing, Tampering, Repudiation, Information Disclosure, DoS, Elevation of Privilege with data flow diagrams.
- OWASP Top 10 Vulnerability Scanner — Analyzes {{codebase_description}} for all OWASP Top 10 2025 categories with specific code-level findings and remediation.
- Attack Surface Mapper — Enumerates complete attack surface of {{system}} including APIs, authentication endpoints, file uploads, third-party integrations, and infrastructure.
- Security Code Review Agent — Reviews {{language}} code for injection, XSS, CSRF, insecure deserialization, broken auth, and sensitive data exposure with CWE references.
- Penetration Test Report Writer — Generates professional pentest report for {{engagement}} with executive summary, technical findings, risk ratings (CVSS), and remediation priorities.
- Incident Response Playbook Creator — Builds IR playbook for {{incident_type}} (ransomware, data breach, DDoS, insider threat) with detection, containment, eradication, and recovery phases.
- SOC Alert Triage Workflow — Creates triage decision trees for {{alert_type}} with true/false positive indicators, escalation criteria, and response actions.
- Cloud Security Posture Reviewer — Audits {{cloud_provider}} configuration for misconfigurations: public S3 buckets, overprivileged IAM, unencrypted storage, exposed endpoints.
- API Security Assessment — Tests {{api_spec}} for broken authentication, excessive data exposure, lack of rate limiting, BOLA, and mass assignment vulnerabilities.
- Social Engineering Scenario Designer — Creates phishing simulation scenarios for {{organization}} security awareness training with realistic pretexts and success metrics.
- Network Segmentation Reviewer — Evaluates network architecture of {{environment}} for lateral movement risks with micro-segmentation recommendations.
- Vulnerability Prioritization Matrix — Scores and prioritizes {{vulnerability_count}} findings using CVSS, exploit availability, business context, and remediation effort.
- Zero Trust Architecture Planner — Designs zero trust implementation for {{organization}} with identity verification, microsegmentation, and continuous validation.
- Security Champion Training Designer — Creates security training curriculum for {{developer_team}} covering secure coding, threat awareness, and security testing skills.
- Compliance Gap Analyzer — Maps {{current_controls}} against {{compliance_standard}} (SOC 2, ISO 27001, PCI DSS, HIPAA) with gap identification and remediation roadmap.
Each Prompt Includes
- {{placeholder}} variables for target system, threat model, compliance framework, and organizational context
- Expected output: threat models, vulnerability reports, playbooks, or compliance matrices with severity ratings
- Chain-of-thought attack scenario walkthrough and self-consistency validation for findings
- Anti-patterns: security theater, checkbox compliance, and false sense of security traps
- CWE/CVE references and MITRE ATT&CK framework mapping where applicable
Who This Is For
- Security engineers and penetration testers who want systematic, repeatable methodologies
- SOC analysts building alert triage workflows and incident response procedures
- DevSecOps teams integrating security into CI/CD pipelines
- CTOs and engineering managers responsible for application security without dedicated security teams
- Compliance officers preparing for SOC 2, ISO 27001, or PCI DSS audits
What Makes This Different
- Covers the FULL security lifecycle: threat modeling, testing, detection, response, and compliance
- Based on real-world penetration testing methodologies — PTES, OWASP Testing Guide, NIST SP 800-115
- Includes both offensive (red team) and defensive (blue team) perspectives
- Maps to MITRE ATT&CK framework for industry-standard threat intelligence
Works With
ChatGPT (GPT-4+), Claude (3.5+), Gemini Pro. Best with Claude for detailed security analysis and code review.