CyberSecurityUP / n8n-CyberSecurity-WorkflowsLinks
Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆462Updated 4 months ago
Alternatives and similar repositories for n8n-CyberSecurity-Workflows
Users that are interested in n8n-CyberSecurity-Workflows are comparing it to the libraries listed below
Sorting:
- ☆258Updated 3 months ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆442Updated 3 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆118Updated 11 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 6 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆722Updated 5 months ago
- All the deals for InfoSec related software/tools this Black Friday☆261Updated 2 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆468Updated this week
- A collection of methods to learn who the owner of an IP address is.☆224Updated 4 months ago
- ☆142Updated 7 months ago
- ☆192Updated last year
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆359Updated 2 months ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆81Updated last month
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆274Updated last week
- ☆220Updated last year
- Offline Cybersecurity Knowledge Base☆199Updated this week
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆236Updated last week
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆143Updated last year
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆194Updated 2 months ago
- MCP Server for Wazuh SIEM☆166Updated last month
- This project is a Terraform-based implementation for deploying a Security Operations Center (SOC) using Kali Linux in AWS. It provides an…☆117Updated last year
- AI Red Teaming Range☆115Updated 10 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆331Updated 2 weeks ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124Updated 2 years ago
- An archive of 0day.today exploits☆332Updated 6 months ago
- A tool for mapping cyber crime☆236Updated this week
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆263Updated this week
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆408Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 8 months ago
- Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebo…☆66Updated last week