Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆99Sep 20, 2025Updated 6 months ago
Alternatives and similar repositories for n8n-Red-Blue-AppSec-workflows
Users that are interested in n8n-Red-Blue-AppSec-workflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated last year
- ☆12Mar 8, 2025Updated last year
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆35Jul 13, 2025Updated 9 months ago
- Code Repository for Python for Beginners with Examples, published by Packt☆10Oct 28, 2022Updated 3 years ago
- A Series of Tweets☆15Jan 30, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🌍 My website☆10Nov 23, 2025Updated 4 months ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆52Jan 16, 2026Updated 3 months ago
- A large repository of all payloads ive written over the years, updated specifically for Bad-USB using Flipper Zero!☆18Oct 4, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆82Nov 20, 2025Updated 4 months ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆20Nov 10, 2024Updated last year
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 11 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆48Sep 22, 2025Updated 6 months ago
- Telegram Spammer ini digunakan untuk menyepam telegram pelaku penyebar Aplikasi Scamm atau Phising☆12Feb 25, 2024Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Apr 15, 2025Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- Website Portfolio V2☆12Sep 26, 2024Updated last year
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.☆74Updated this week
- ☆12Mar 20, 2022Updated 4 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆13May 12, 2025Updated 11 months ago
- ☆16Sep 23, 2021Updated 4 years ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- e2e Scanning research module☆25Mar 26, 2026Updated 3 weeks ago
- XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hack…☆15Nov 14, 2025Updated 5 months ago
- Course project for Comp5117. We will be using the MSR 2023 dataset to complete the project and mine data from their dataset☆12Dec 16, 2022Updated 3 years ago
- Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSens…☆221Dec 31, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AI Powered Transform raw notes into polished, professional formats☆35Aug 16, 2025Updated 8 months ago
- Use claude code anywhere.☆61Mar 27, 2026Updated 3 weeks ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 9 months ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated 2 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- A Lightning-Fast DNS Resolver written in Rust 🦀☆69Nov 19, 2024Updated last year