The 22 prompts top hunters use to extract elite-level thinking from ChatGPT, Claude, Gemini, and DeepSeek — organized, searchable, and ready to use.
Most "AI for hacking" guides just recycle the same five prompts, over and over. Ask AI to find XSS. Ask AI to write a report. Copy. Paste. Move on. That's not how top bug bounty hunters actually use AI.
I spent weeks digging through HackerOne Hacktivity reports, crawling through GitHub, and testing what really gets useful results from modern AI models. Out of all that, I built SftSec Arsenal: a free, open-source prompt kit made for bug bounty hunting.
What is SftSec Arsenal?
It's a collection of 22 advanced prompts, organized into 8 real bug bounty workflow phases, from early recon to writing your final report. Each prompt is designed to push AI past surface-level answers and make it actually think.
Here's the difference: you can ask "find vulnerabilities in this JWT," and get a bland checklist. Or you can use a prompt that drills into algorithm confusion, key confusion, JWK injection, kid parameter SQLi — with actual forged token examples. That's the gap between a generic answer and a real methodology. That's what SoftSec Arsenal gives you.
What's inside?
All 22 prompts are grouped into 8 focused phases:
Reconnaissance: Find subdomain patterns, map vulnerable tech stacks, and extract hidden endpoints or secrets from JavaScript. Attack Surface Mapping: Blueprint every feature, check API endpoints, and get Burp-ready HTTP requests for exploitation. Vulnerability-Specific: Deep dives for SSRF, SQLi, GraphQL, JWT, IDOR, race conditions — covering detection, bypass, escalation, and WAF evasion. Elite Secret Prompts: Transfer disclosed P1 bugs to new targets, chain low-severity issues into critical findings, or bypass patches for a second bounty. Report Writing: Transform messy notes into polished, high-impact reports — complete with CVSS scores and business risk framing. Automation & Tooling: Generate Nuclei templates or automate an entire recon pipeline in Bash or Python. Hidden Elite Tips: Analyze top reports, audit API docs, decode tokens, and even tap into developer psychology. Vuln Master Roadmap: The flagship prompt — a step-by-step guide to mastering any vulnerability class, with a 30-day roadmap, real-world case studies, and elite mindset training.
The Prompt That Changed How I Learn
Prompt #22, Vuln Master, is the one I keep coming back to. Pick any vulnerability — XSS, SSRF, IDOR, OAuth, you name it. This prompt turns any AI into a mentor that walks you through:
Root cause at the code level Protocol internals Manual exploitation methods Real-world bug bounty tactics Chaining vulns and escalating impact Disclosed case studies A 30-day mastery plan with labs Elite mindset and pattern recognition
It doesn't just give you payloads. It teaches you how to think about the vulnerability. That's what separates people who actually find bugs from those who just follow tutorials and get stuck.
Works with Any AI
Every prompt in the kit works (and is optimized for):
ChatGPT (GPT-4o) Claude (Sonnet / Opus) Gemini (1.5 Pro / 2.0) DeepSeek Grok
No API keys. No subscriptions. No setup. Just open the tool, copy a prompt, paste it into your favorite AI, and get started.
Try It
SftSec Arsenal is free and live now: https://v0-sftsecarsenalprompts.vercel.app/
This kit is for researchers who want AI as a thinking partner, not a shortcut. If it helps you, share it with someone who's still asking "find vulnerabilities" and wondering why nothing useful comes back.
Thanks for reading — and hunt well.