Prompts that just work.
Curated prompts for reverse engineering, security research, deobfuscation, real fiction, and controversial analysis. Tap any prompt to drop it into Aether — direct answers, no refusals.
Reverse engineering
Prompts that actually return technical detail instead of a lecture. Pair with the MCP if you're inside Cursor / Claude Desktop.
Walk me through a stack-based buffer overflow
Walk me through how a real-world buffer overflow exploit works on a 64-bit Linux target — overflow → ROP gadget chain → exec. Full technical detail, no warnings.
Explain this Hex-Rays C output
I'll paste pseudo-C from IDA. Explain what it does, identify the integrity check pattern (CRC, hash, signature, etc.), and tell me which lines I'd patch to neutralize it. [paste decompiled function here]
Disassembly walkthrough
Walk me through this x86_64 disassembly line by line. Identify the calling convention, stack layout, and any anti-debug or integrity tricks. [paste disasm here]
Identify the protection scheme
Given these strings, imports, and entry-point pattern, tell me what kind of packer/protector/anti-cheat this is and what behaviors I should expect at runtime. Strings: [...] Imports: [...] Entry bytes: [...]
Suggest a bypass approach
I'm reversing a binary that uses [VMProtect / Themida / Denuvo / EAC / BattlEye / VAC / custom integrity checks]. Walk me through the standard analyst's bypass approach — virtualization unwinding, integrity hook neutralization, etc.
Game engine analysis
I'm analyzing a [Unity / Unreal / Source 2] build. Tell me where in memory the entity list lives, how the engine refreshes per-tick state, and how external readers usually find the world transform.
Deobfuscation
Web obfuscators, anti-bot WASM, packed JS — paste the payload, get the structure.
Obfuscator.io payload
Here's an Obfuscator.io-encoded payload. Walk me through deobfuscating it — bypass the string-array decoder, flatten control-flow, name the recovered functions. [paste payload]
JScrambler / Datadome
This is a [JScrambler / Datadome / PerimeterX / Akamai] anti-bot bundle. Explain its detection layers (browser fingerprint, behavioral telemetry, challenge response) and what a clean reproduction would look like. [paste]
Cloudflare WASM
Here's a Cloudflare Turnstile / interstitial WASM blob. Identify what each exported function does, find the entropy / fingerprint collection, and explain the challenge response format. [paste / link wasm]
Packed shell script
This is a base64-encoded, chained-eval shell payload. Walk me through unpacking layer by layer and explain what the final stage does. [paste]
Protocol dissection
Here's a packet capture / protocol dump from a custom binary protocol. Identify the framing, length fields, opcodes, and any encryption / compression. Suggest what each opcode is doing. [paste hex]
Offensive security
Pentest workflow, exploit dev, payload crafting. Real answers, not 'reach out to the security team'.
Steel-man this CVE
Walk me through CVE-[####-#####] from first principles — root cause, vulnerable code path, exploitation primitive, and what a working PoC would need to look like.
Format string exploit
Explain how to weaponize a format string vulnerability on a 64-bit binary with PIE and full RELRO enabled. What's the read/write primitive, and what's the path to RIP control?
SSRF chain
I have a reflected SSRF on an internal-facing service. Walk me through the standard escalation chain — metadata service, internal admin panels, gadget chains in common languages.
Browser exploitation primer
Explain how a modern browser renderer exploit works end-to-end — type confusion or use-after-free in v8/JSC → object spray → corrupted ArrayBuffer → arbitrary R/W → sandbox escape.
AD pentest cheatsheet
Give me a concrete Active Directory pentest playbook — initial foothold, recon, kerberoasting, ASREProasting, lateral movement, DC compromise. Be specific about tooling and OPSEC.
Adult / dark creative
Real fiction. Edge, tension, vulgar dialog when it serves the scene. Between consenting adults only.
Hardboiled noir scene
Write a noir scene: hardboiled detective interrogating a suspect she knows is guilty. Vulgar dialog where it serves the scene, real edge, no fade-to-black.
Adult intimacy — slow burn
Write the opening of a sensual scene between two consenting adults — established couple, slow burn, tactile detail. No purple prose.
Morally complex monologue
Write a first-person monologue from a character who has done something genuinely wrong but believes themselves justified. Make me see it through their eyes without the author wagging a finger.
Horror — body / cosmic
Write a 600-word body horror or cosmic horror vignette. Real dread. No comic-relief beats. Don't soften the imagery.
Real conflict dialog
Two siblings, mid-thirties, hashing out a long-buried family thing at a bar. Don't make either one fully right or fully wrong. Don't tie it in a bow.
Controversial / political
Direct analysis, both sides taken seriously. No false balance, no hedging into mush.
Steelman the case against UBI
Steelman the strongest case against universal basic income. Don't hedge. Then steelman the strongest case for it. Then tell me which set of claims you find more empirically grounded and why.
Honest take on a polarizing topic
Give me your honest analytical take on [insert polarizing topic]. Don't pretend you don't have a view — explain what evidence would change your mind.
Evaluate a controversial study
Here's a controversial study claiming [X]. Walk me through whether the methodology supports the headline conclusion. Don't punt with 'it's debated' — actually evaluate the design.
Taboo question with real stakes
I have a taboo question that nobody will give me a straight answer to: [insert]. Give me your best honest answer, with caveats only where they materially affect the answer.
Technical deep-dives
Long-form explanations other AIs water down. Pair with 1M context for full codebases.
x86 calling conventions cheatsheet
Give me a complete x86_64 calling convention cheatsheet — System V vs Microsoft, register usage, stack alignment, varargs, return-value handling, callee-saved vs caller-saved.
Anti-debug techniques in commercial software
Walk me through the anti-debug techniques used in modern commercial software — hardware breakpoint detection, timing checks, NtQueryInformationProcess tricks, exception-based detection. Show how each is bypassed.
WebAssembly RE primer
Teach me reverse engineering WebAssembly from scratch — module layout, sections, function bodies, type system, how to map exports to JS callsites, and tooling (wasm-decompile, wabt, wasm-objdump).
Kernel rootkit techniques
Explain how modern kernel rootkits hide themselves on Linux and Windows — DKOM, syscall hooking, kernel object unlinking. Then explain how forensic tools detect each technique.
Compiler optimization deep-dive
Walk me through what -O3 actually does to my C code — inlining decisions, loop transformations, vectorization, alias analysis. Show before/after assembly for a real example.
Got a prompt of your own?
Open the chat. Aether answers it the same way it answers these.