Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆99Sep 20, 2025Updated 6 months ago
Alternatives and similar repositories for n8n-Red-Blue-AppSec-workflows
Users that are interested in n8n-Red-Blue-AppSec-workflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful…☆11Mar 24, 2025Updated last year
- ☆12Mar 8, 2025Updated last year
- Application Security pipelines☆51May 25, 2022Updated 3 years ago
- Java JDBC PostgreSQL Tutorials☆15Feb 7, 2020Updated 6 years ago
- 🌍 My website☆10Nov 23, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆51Jan 16, 2026Updated 2 months ago
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆81Nov 20, 2025Updated 4 months ago
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆20Nov 10, 2024Updated last year
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 10 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Apr 15, 2025Updated 11 months ago
- ☆23Sep 19, 2024Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- this script for spamming Indonesian number☆10Mar 12, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.☆14Mar 1, 2026Updated 3 weeks ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- ☆16Aug 1, 2023Updated 2 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 10 months ago
- Use claude code anywhere.☆55Feb 12, 2026Updated last month
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- An Automated Network Penetration and Vulnerability Analysis Tool Written In Bash☆29Apr 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆12Mar 20, 2022Updated 4 years ago
- Version 2 of the Rhythm Randomizer project☆13Jan 6, 2023Updated 3 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- Convert your HackerOne reports into reusable AI skills.☆73Mar 9, 2026Updated 3 weeks ago
- Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSens…☆217Dec 31, 2025Updated 2 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆76Updated this week
- ☆16Sep 23, 2021Updated 4 years ago
- XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hack…☆15Nov 14, 2025Updated 4 months ago
- Course project for Comp5117. We will be using the MSR 2023 dataset to complete the project and mine data from their dataset☆12Dec 16, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- AI Powered Transform raw notes into polished, professional formats☆35Aug 16, 2025Updated 7 months ago
- A TUI for Active Directory collection.☆134Mar 17, 2026Updated last week
- ☆11Oct 9, 2022Updated 3 years ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- An example vulnerable app that integrates an LLM☆26Apr 5, 2024Updated last year
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- ☆27May 6, 2024Updated last year