Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆639Sep 20, 2025Updated 7 months ago
Alternatives and similar repositories for n8n-CyberSecurity-Workflows
Users that are interested in n8n-CyberSecurity-Workflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆109Feb 14, 2026Updated 2 months ago
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆307Dec 16, 2025Updated 4 months ago
- ☆272Oct 6, 2025Updated 6 months ago
- ☆17Feb 17, 2025Updated last year
- ☆121May 26, 2025Updated 11 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆215Mar 4, 2026Updated last month
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆101Oct 15, 2025Updated 6 months ago
- A PowerShell module for the Defender XDR portal☆119Mar 31, 2026Updated last month
- ☆19Sep 1, 2025Updated 7 months ago
- ☆23Apr 16, 2025Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,074Mar 10, 2026Updated last month
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebo…☆132Apr 20, 2026Updated last week
- ☆68Apr 16, 2026Updated last week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Payload Generation Workflow☆41Jul 18, 2025Updated 9 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆466Feb 18, 2026Updated 2 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 10 months ago
- A curated list of AI driven Cyber security Resources☆48Mar 28, 2026Updated last month
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSens…☆221Dec 31, 2025Updated 3 months ago
- Run TTPs, with AI!☆127Feb 23, 2026Updated 2 months ago
- Bloodhound Portable for Windows☆54Apr 1, 2023Updated 3 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- ☆249Mar 29, 2025Updated last year
- Quick ESXi Log Parser☆31Oct 20, 2025Updated 6 months ago
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆42Jun 10, 2025Updated 10 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆149Aug 15, 2024Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆286Apr 10, 2026Updated 2 weeks ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆324Mar 27, 2025Updated last year
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆106Updated this week
- A modular, skill-based autonomous Security Operations Center (SOC) agent that monitors OpenSearch/Elasticsearch data, builds RAG-based be…☆233Apr 15, 2026Updated 2 weeks ago
- ☆59Dec 10, 2025Updated 4 months ago
- Awesome Security lists for SOC/CERT/CTI☆1,430Updated this week