Find the perfect prompt
32 prompts across 23 categories and 34 models
Write a Data Pipeline
Design and build a complete data pipeline for any ETL or data processing task.
Set Up Application Monitoring and Observability
Implement a complete observability stack covering logs, metrics, and traces.
Conduct a Code Architecture Review
Get a thorough architectural assessment of any codebase with prioritised improvements.
AI-Powered REDCap Data Management & Analysis Guide
Generates a comprehensive guide explaining how to integrate AI tools with REDCap databases to automate data extraction, enhance analysis, and transform raw research data into actionable insights while maintaining security and compliance.
AI Automation Strategy for Global Digital Marketing Service Desk
Provides actionable guidance on implementing AI automation solutions to streamline issue resolution, reduce response times, and enhance efficiency for a global service desk supporting 49 markets and collaborating with Meta clients and representatives.
AI for Incident Response: Implementation Guide for Organizations
Provides a detailed guide on implementing AI in organizational incident response, including benefits, strategies, recommended tools, step-by-step implementation, and best practices to enhance cybersecurity efficiency.
Analyze Trends in a Cybersecurity Threat Intelligence Report
Extract emerging trends, patterns, and strategic signals from a cybersecurity threat intelligence report.
Analyze a Cybersecurity Threat Report (Full)
Comprehensive analysis of a cybersecurity threat report with findings, risk scoring, and remediation priorities.
Create a Poppy AI Prompt
Design an optimized, reusable AI prompt for any task using professional prompt engineering principles.
Create AI System for Misinformation Detection
Design an AI-powered misinformation detection system with architecture, data sources, and evaluation methodology.
Create Comprehensive Prompt
Engineer a multi-part, highly detailed AI prompt designed to extract professional-grade output for complex tasks.
Create Cyber Summary
Summarize a cybersecurity incident, vulnerability, or threat report into a clear executive briefing.
Create Cybersecurity Audit Guide
Write a step-by-step cybersecurity audit guide covering scope, methodology, controls, and reporting.
Create Cybersecurity Job Description
Write a compelling, accurate cybersecurity job description that attracts qualified candidates and clearly defines the role.