Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆100Sep 20, 2025Updated 7 months ago
Alternatives and similar repositories for n8n-Red-Blue-AppSec-workflows
Users that are interested in n8n-Red-Blue-AppSec-workflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Mar 8, 2025Updated last year
- Application Security pipelines☆50May 25, 2022Updated 3 years ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆35Jul 13, 2025Updated 9 months ago
- Code Repository for Python for Beginners with Examples, published by Packt☆10Oct 28, 2022Updated 3 years ago
- 🌍 My website☆10Nov 23, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Google Dorking Payloads☆13Jun 24, 2024Updated last year
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆53Jan 16, 2026Updated 3 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆83Nov 20, 2025Updated 5 months ago
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆20Nov 10, 2024Updated last year
- Tool for scanning domains for .git directories.☆18Oct 2, 2023Updated 2 years ago
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 11 months ago
- ☆17Aug 1, 2023Updated 2 years ago
- Purple Team Strategies, Published by Packt☆16Apr 22, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆23Sep 19, 2024Updated last year
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 9 months ago
- this script for spamming Indonesian number☆10Mar 12, 2025Updated last year
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆28Apr 15, 2025Updated last year
- This is a PAM Skeleton Key that can be used for persistence, lateral movement, and privilege escalation.☆43Apr 23, 2026Updated 2 weeks ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 3 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆25Updated this week
- Website Portfolio V2☆12Sep 26, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Mar 20, 2022Updated 4 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆14May 12, 2025Updated 11 months ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆84Apr 30, 2026Updated last week
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- ☆16Sep 23, 2021Updated 4 years ago
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- Course project for Comp5117. We will be using the MSR 2023 dataset to complete the project and mine data from their dataset☆12Dec 16, 2022Updated 3 years ago
- Burpsuite Extension for Jsmon☆23Apr 6, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSens…☆224Dec 31, 2025Updated 4 months ago
- AI Powered Transform raw notes into polished, professional formats☆35Aug 16, 2025Updated 8 months ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- Use claude code anywhere.☆62Apr 19, 2026Updated 2 weeks ago
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 10 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- A course about terraform☆11Apr 13, 2021Updated 5 years ago