Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆602Sep 20, 2025Updated 5 months ago
Alternatives and similar repositories for n8n-CyberSecurity-Workflows
Users that are interested in n8n-CyberSecurity-Workflows are comparing it to the libraries listed below
Sorting:
- Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebo…☆113Feb 20, 2026Updated last week
- ☆108Feb 14, 2026Updated 2 weeks ago
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆302Dec 16, 2025Updated 2 months ago
- ☆267Oct 6, 2025Updated 4 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- A simple HTTP server that wraps an unofficial free WhatsApp API.☆16Aug 19, 2025Updated 6 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆209Nov 25, 2025Updated 3 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,047Feb 16, 2026Updated 2 weeks ago
- ☆58Dec 10, 2025Updated 2 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- ☆120May 26, 2025Updated 9 months ago
- Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.☆47Jan 22, 2026Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated 11 months ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Nov 5, 2023Updated 2 years ago
- ☆251Mar 29, 2025Updated 11 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆226Apr 18, 2025Updated 10 months ago
- ☆335Aug 20, 2025Updated 6 months ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆251Feb 8, 2026Updated 3 weeks ago
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆41Jun 10, 2025Updated 8 months ago
- Quick ESXi Log Parser☆29Oct 20, 2025Updated 4 months ago
- ☆44Jul 9, 2024Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆302Updated this week
- A modern, lightweight self-hosted dashboard for monitoring services, Docker containers, and system resources. Built with Next.js 16 for s…☆55Feb 1, 2026Updated last month
- A resource containing all the tools each ransomware gangs uses☆1,330Dec 24, 2025Updated 2 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆96Oct 15, 2025Updated 4 months ago
- Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques☆95Dec 28, 2025Updated 2 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Aug 15, 2024Updated last year
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆320Mar 27, 2025Updated 11 months ago
- A Python script for extracting IP addresses, URLs, headers, and attachments from .eml files. Additional functionalities include defanging…☆42Oct 10, 2024Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- some KQL Queries for Advanced Hunting☆65Updated this week
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆204Mar 6, 2025Updated 11 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆431Feb 18, 2026Updated last week
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆189Feb 10, 2026Updated 3 weeks ago
- ☆27Sep 5, 2025Updated 5 months ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- A BugBounty playbook covering vulnerability bypasses, payloads, and quick checks for OWASP Top 10 + extras.☆22Sep 29, 2025Updated 5 months ago