Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆96Sep 20, 2025Updated 5 months ago
Alternatives and similar repositories for n8n-Red-Blue-AppSec-workflows
Users that are interested in n8n-Red-Blue-AppSec-workflows are comparing it to the libraries listed below
Sorting:
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated 11 months ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 7 months ago
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆48Jan 16, 2026Updated last month
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆80Nov 20, 2025Updated 3 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- ☆12Mar 8, 2025Updated last year
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆23Jan 3, 2026Updated 2 months ago
- Version 2 of the Rhythm Randomizer project☆13Jan 6, 2023Updated 3 years ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- AIM - The open-source NHI platform for AI agents. Cryptographic identity, governance, and access control.☆37Updated this week
- Put All Mirror in ONE☆12Feb 18, 2026Updated 2 weeks ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆75Feb 27, 2026Updated last week
- Telegram Spammer ini digunakan untuk menyepam telegram pelaku penyebar Aplikasi Scamm atau Phising☆12Feb 25, 2024Updated 2 years ago
- 🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit☆65Updated this week
- this script for spamming Indonesian number☆10Mar 12, 2025Updated 11 months ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- ☆15Aug 1, 2023Updated 2 years ago
- ☆34Feb 27, 2026Updated last week
- ☆12Mar 20, 2022Updated 3 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- Course project for Comp5117. We will be using the MSR 2023 dataset to complete the project and mine data from their dataset☆12Dec 16, 2022Updated 3 years ago
- ☆14Nov 8, 2024Updated last year
- Burpsuite Extension for Jsmon☆22Feb 5, 2026Updated last month
- ☆13Feb 25, 2021Updated 5 years ago
- Official Black Hat Arsenal Security Tools Repository☆14Aug 12, 2017Updated 8 years ago
- EduSync is a user-friendly web app that helps students stay organized throughout the school year.☆13Jan 9, 2026Updated 2 months ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Super efficient 1-click watermark webpage, offline - protect your personal PDF docs☆57Jun 4, 2025Updated 9 months ago
- A list of free and paid apps to turn your Mac into a server☆26Mar 4, 2025Updated last year
- Shell script to set up Kali VMs for CTFs - installs tools and adds aliases to Bash and Zsh profiles.☆15Dec 30, 2025Updated 2 months ago
- XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hack…☆16Nov 14, 2025Updated 3 months ago
- MetaX - Advanced XSS Vulnerability Detector☆15Dec 30, 2025Updated 2 months ago
- Website Portfolio V2☆12Sep 26, 2024Updated last year
- 🌍 My website☆10Nov 23, 2025Updated 3 months ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- Purple Team Strategies, Published by Packt☆14Mar 2, 2026Updated last week
- Application Security pipelines☆51May 25, 2022Updated 3 years ago