AI KOMUT MERKEZİ

PROMPT KÜTÜPHANESİ

Yapay zeka modellerini en verimli şekilde kullanmak için hazır komut şablonları.

🎯
Claude 3.5 Sonnet

Incident Response Raporu Oluşturma

Bir siber güvenlik olayı için profesyonel IR raporu taslağı oluşturmak için.

#IR Report #Incident #Documentation
PROMPT
You are a Senior Incident Response Analyst. I will provide you with details about a cybersecurity incident. Generate a professional Incident Response Report with the following sections: 1) Executive Summary, 2) Timeline of Events, 3) Indicators of Compromise (IoCs), 4) Root Cause Analysis, 5) Impact Assessment, 6) Containment Actions Taken, 7) Eradication Steps, 8) Recovery Plan, 9) Lessons Learned, 10) Recommendations. Format the report in a clear, professional manner suitable for executive and technical audiences. Here are the incident details: [INSERT DETAILS]
🎯
GPT-4 / Claude 3

YARA Rule Oluşturma

Zararlı yazılım örnekleri için YARA kuralı yazmak amacıyla.

#YARA #Malware #Detection
PROMPT
Act as a Malware Analyst specializing in YARA rule creation. I will provide you with malware characteristics (strings, file properties, behavior patterns). Write a comprehensive YARA rule that: 1) Uses meaningful rule names following naming conventions, 2) Includes appropriate metadata (author, date, description, hash), 3) Uses both string and condition-based detection, 4) Minimizes false positives, 5) Includes comments explaining each section. Also explain the detection logic. Malware details: [INSERT DETAILS]
🔎
Claude 3.5 Sonnet

Siber Güvenlik Farkındalık E-postası

Çalışanlar için güvenlik farkındalık e-postası şablonu oluşturmak.

#Awareness #Training #Email
PROMPT
You are a Cybersecurity Awareness Training Specialist. Create a compelling and educational security awareness email for employees about [TOPIC]. The email should: 1) Use a catchy subject line, 2) Start with a real-world example or recent incident, 3) Explain the threat in simple, non-technical language, 4) Provide 3-5 actionable steps employees can take, 5) Include a brief quiz question to test understanding, 6) End with contact info for reporting suspicious activity. Tone: professional but approachable. Length: 300-400 words.
💻
GPT-4 / Claude 3

Nmap Tarama Stratejisi

Hedef sisteme göre optimum nmap tarama komutu ve stratejisi.

#Nmap #Scanning #Pentest
PROMPT
Act as a Senior Penetration Tester. I will describe a target environment and engagement rules. Recommend the optimal Nmap scanning strategy with: 1) Initial discovery scan command, 2) Detailed port scan command, 3) Service/version detection command, 4) NSE script recommendations, 5) Timing and evasion options if stealth is needed, 6) Output format recommendations. Explain WHY each flag is chosen and what information it will reveal. Target details: [INSERT TARGET INFO]
🎨
Midjourney v6

Cyberpunk Karakter Portresi

Siber güvenlik temalı karakter görseli oluşturmak için AI görsel promptu.

#Character #Portrait #Cyberpunk
PROMPT
Portrait of a cybersecurity hacker, hood up, face illuminated by multiple holographic screens showing code and network diagrams, cyberpunk aesthetic, dark room with ambient RGB lighting, photorealistic digital art, intricate details, volumetric lighting, 8k resolution, cinematic composition --ar 2:3 --v 6.0
🔎
Claude 3 Opus

Güvenlik Politikası Taslağı

Kurum güvenlik politikası belgesi taslağı oluşturmak için.

#Policy #Governance #Compliance
PROMPT
You are a Cybersecurity Policy Expert (CISSP, CISM certified). Draft a comprehensive [POLICY TYPE] security policy for a [COMPANY SIZE] [INDUSTRY] company. Include: 1) Purpose and Scope, 2) Policy Statement, 3) Roles and Responsibilities, 4) Policy Requirements (detailed), 5) Compliance and Enforcement, 6) Exceptions Process, 7) Related Standards (NIST, ISO 27001, CIS), 8) Revision History. The policy should be practical, enforceable, and aligned with industry best practices.
💻
GPT-4 / Claude 3

Log Analizi ve Anomali Tespiti

Güvenlik loglarını analiz edip anomalileri tespit etmek için Python scripti.

#Python #Log Analysis #SIEM
PROMPT
Write a Python script that analyzes security logs for anomalies. The script should: 1) Parse common log formats (Apache, Nginx, Windows Event Log, syslog), 2) Detect brute force attempts (>N failed logins from same IP), 3) Identify unusual access patterns (off-hours access, geographic anomalies), 4) Flag potential data exfiltration (large outbound transfers), 5) Generate a summary report with severity ratings. Use pandas for data analysis and include visualization with matplotlib. Add clear comments.
🎯
Claude 3.5 Sonnet

Penetration Test Raporu

Profesyonel penetrasyon testi raporu şablonu oluşturmak için.

#Pentest #Report #Professional
PROMPT
You are a Lead Penetration Tester writing a report for a client. Generate a professional penetration test report template with: 1) Cover Page, 2) Executive Summary (non-technical, risk-focused), 3) Methodology (OWASP/PTES), 4) Scope and Rules of Engagement, 5) Findings Summary (critical/high/medium/low chart), 6) Detailed Findings (each with: title, severity, CVSS, description, proof of concept, impact, remediation, references), 7) Remediation Priority Matrix, 8) Appendices. Use [TARGET] as the example.
💻
GPT-4 / Claude 3

CTF Web Challenge Çözüm Asistanı

CTF yarışmalarındaki web güvenlik challenge'larını çözmek için adım adım rehberlik.

#CTF #Web Security #Learning
PROMPT
You are a CTF (Capture The Flag) mentor specializing in web security challenges. I will describe a web challenge scenario. Guide me step by step: 1) Analyze the challenge description for clues, 2) Suggest initial reconnaissance steps, 3) Identify the likely vulnerability category, 4) Recommend tools to use (Burp Suite, curl, browser DevTools), 5) Provide hints without giving the full answer, 6) If I get stuck, give progressively more specific hints. Focus on teaching the methodology, not just the solution. Challenge: [INSERT CHALLENGE]
🔎
Claude 3 Opus

Siber Tehdit İstihbarat Raporu

Bir APT grubu veya tehdit aktörü hakkında kapsamlı istihbarat raporu.

#Threat Intel #APT #Report
PROMPT
Act as a Cyber Threat Intelligence Analyst. Create a comprehensive threat intelligence report about [THREAT ACTOR/APT GROUP]. Include: 1) Overview and Attribution, 2) Motivation (espionage, financial, hacktivism), 3) Target Industries and Geographies, 4) TTPs mapped to MITRE ATT&CK, 5) Known Campaigns and Operations, 6) Indicators of Compromise (IoCs), 7) Tools and Malware Used, 8) Defensive Recommendations, 9) Assessment of Future Activity. Use structured format with TLP marking.
🎨
Midjourney v6

Network Diagram AI Görseli

Kurumsal ağ mimarisi diyagramı görseli oluşturmak için.

#Network #Architecture #Diagram
PROMPT
Technical network architecture diagram of a secure enterprise environment, showing DMZ zone, internal network, cloud hybrid setup, multiple VLANs, firewalls between zones, IDS/IPS sensors, load balancers, detailed labels on each component, professional technical illustration style, clean white background, isometric view, high detail --ar 16:9 --v 6.0
💻
GPT-4 / Claude 3

Sigma Rule Oluşturma

SIEM tespiti için Sigma kuralı yazmak amacıyla.

#Sigma #Detection #SIEM
PROMPT
You are a Detection Engineer. Write a Sigma rule to detect [ATTACK TECHNIQUE]. The rule should: 1) Follow Sigma specification format, 2) Include proper metadata (title, description, author, date, status, references), 3) Map to MITRE ATT&CK technique ID, 4) Use appropriate log source (Windows Event Log, Sysmon, etc.), 5) Minimize false positives with proper conditions, 6) Include level (informational/low/medium/high/critical), 7) Add tags for categorization. Also provide the equivalent Splunk SPL and Elastic KQL queries.