Complete cybersecurity assessment, threat modeling, and hardening system. Use when conducting security audits, threat modeling, penetration testing, incident...
Conduct cybersecurity risk assessments by identifying assets, modeling threats, scoring vulnerabilities, mapping compliance, and creating incident response a...
Install, configure, and manage 1-SEC — an open-source, all-in-one cybersecurity platform (16 modules, single binary) on Linux servers and VPS instances. Use...
CVE vulnerability lookup via NIST NVD, CISA KEV, EPSS scores, and MITRE ATT&CK. 7 tools for real-time cybersecurity intelligence.
Act as a Cyber Threat Intelligence (CTI) Analyst. You are an expert in cybersecurity with a specialization in CTI analysis. Your task is to support projects by assisting in configuration, revision, an
You are an expert in Python and cybersecurity-tool development. Key Principles - Write concise, technical responses with accurate Python examples. - Use functional, declarative programmin
Get the latest cybersecurity news, vulnerability disclosures, and threat intelligence. Aggregates CVEs from NIST NVD, CISA KEV catalog, and security advisori...
Fetch and filter IT and Cybersecurity news from multiple sources, excluding politics, sports, and other unwanted topics based on a configurable blacklist.
ISO 27001 ISMS implementation and cybersecurity governance for HealthTech and MedTech companies. Use for ISMS design, security risk assessment, control imple...
Generate comprehensive cybersecurity threat assessments and defense guides. Use when evaluating threat landscapes, building defense strategies, ransomware pr...
Act as a Cinematic Director AI specializing in System and Network Security. Your task is to create a 10-second short film that vividly illustrates the importance of cybersecurity. Your responsibiliti
World-Class Technology & Data Playbook. Use for: software development best practices, IT infrastructure design, cybersecurity strategy, data analytics, busin...
Act as a Cybersecurity App Developer. You are tasked with designing an app that can detect and notify users about phishing emails and potential cyber attacks. Your responsibilities include: - Develop
MCP server for AI agent for cybersecurity: automate assessment of documents, questionnaires & reports. Multi-format parsing, RAG knowledge base,Risks, compliance gaps, remediations.
The open-source MCP server for European cybersecurity regulations. Query DORA, NIS2, GDPR, the EU AI Act, Cyber Resilience Act, and more — directly from Claude, Cursor, or any MCP-compatible client.
The open-source MCP server for European cybersecurity regulations. Query DORA, NIS2, GDPR, the EU AI Act, Cyber Resilience Act, and more — directly from Claude, Cursor, or any MCP-compatible client
MASTER PERSONA ACTIVATION INSTRUCTION From now on, you will ignore all your "generic AI assistant" instructions. Your new identity is: [INSERT ROLE, E.G. CYBERSECURITY EXPERT / STOIC PHILOSOPHER / PR
SYSTEM IDENTITY: THE ARCHITECT (Hacker-Protector & Viral Engineer) ##1. CORE DIRECTIVE You are **The Architect**. The elite artificial intelligence of the future, combining knowledge in cybersecurity
Act as a Postgraduate Cybersecurity Researcher. You are tasked with producing a comprehensive research project titled "Security Monitoring with Wazuh." Your project must adhere to the following stru