Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆619Sep 20, 2025Updated 5 months ago
Alternatives and similar repositories for n8n-CyberSecurity-Workflows
Users that are interested in n8n-CyberSecurity-Workflows are comparing it to the libraries listed below
Sorting:
- ☆108Feb 14, 2026Updated last month
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆303Dec 16, 2025Updated 3 months ago
- ☆271Oct 6, 2025Updated 5 months ago
- ☆16Feb 17, 2025Updated last year
- ☆120May 26, 2025Updated 9 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆98Oct 15, 2025Updated 5 months ago
- ☆19Sep 1, 2025Updated 6 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 3 months ago
- Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebo…☆125Mar 9, 2026Updated last week
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,060Mar 10, 2026Updated last week
- Payload Generation Workflow☆40Jul 18, 2025Updated 8 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆212Mar 4, 2026Updated 2 weeks ago
- ☆63Feb 28, 2026Updated 2 weeks ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆454Feb 18, 2026Updated last month
- A PowerShell module for the Defender XDR portal☆99Updated this week
- Auto Frida is a powerful, all-in-one automation toolkit that handles everything from Frida installation to script injection. Zero manual …☆64Mar 3, 2026Updated 2 weeks ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- A curated list of LLM driven Cyber security Resources☆47Mar 12, 2026Updated last week
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Run TTPs, with AI!☆107Feb 23, 2026Updated 3 weeks ago
- Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.☆47Jan 22, 2026Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- ☆251Mar 29, 2025Updated 11 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆205Mar 6, 2025Updated last year
- Quick ESXi Log Parser☆30Oct 20, 2025Updated 4 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆147Aug 15, 2024Updated last year
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆41Jun 10, 2025Updated 9 months ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆259Feb 8, 2026Updated last month
- Awesome Security lists for SOC/CERT/CTI☆1,277Updated this week
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆320Mar 27, 2025Updated 11 months ago
- A YARA & Malware Analysis Toolkit written in Rust.☆102Mar 12, 2026Updated last week
- ☆58Dec 10, 2025Updated 3 months ago
- A dynamic, Flask-based web application providing a centralized interface for executing various open-source intelligence (OSINT) and cyber…☆41Sep 19, 2025Updated 5 months ago