Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆632Sep 20, 2025Updated 6 months ago
Alternatives and similar repositories for n8n-CyberSecurity-Workflows
Users that are interested in n8n-CyberSecurity-Workflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆109Feb 14, 2026Updated last month
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆308Dec 16, 2025Updated 3 months ago
- ☆272Oct 6, 2025Updated 6 months ago
- ☆18Feb 17, 2025Updated last year
- ☆120May 26, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆99Oct 15, 2025Updated 5 months ago
- ☆19Sep 1, 2025Updated 7 months ago
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 4 months ago
- Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebo…☆128Mar 30, 2026Updated last week
- ☆22Apr 16, 2025Updated 11 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,067Mar 10, 2026Updated 3 weeks ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆214Mar 4, 2026Updated last month
- ☆65Mar 31, 2026Updated last week
- Payload Generation Workflow☆41Jul 18, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆454Feb 18, 2026Updated last month
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 10 months ago
- A curated list of AI driven Cyber security Resources☆48Mar 28, 2026Updated last week
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A PowerShell module for the Defender XDR portal☆115Mar 31, 2026Updated last week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Run TTPs, with AI!☆123Feb 23, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 3 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- ☆249Mar 29, 2025Updated last year
- Quick ESXi Log Parser☆30Oct 20, 2025Updated 5 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆148Aug 15, 2024Updated last year
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆42Jun 10, 2025Updated 9 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆207Mar 6, 2025Updated last year
- Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion☆35Nov 13, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆261Feb 8, 2026Updated 2 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆323Mar 27, 2025Updated last year
- Awesome Security lists for SOC/CERT/CTI☆1,315Updated this week
- A YARA & Malware Analysis Toolkit written in Rust.☆103Mar 30, 2026Updated last week
- ☆59Dec 10, 2025Updated 3 months ago
- A dynamic, Flask-based web application providing a centralized interface for executing various open-source intelligence (OSINT) and cyber…☆44Sep 19, 2025Updated 6 months ago
- FrostLock Injection is a freeze/thaw-based code injection technique that uses Windows Job Objects to temporarily freeze (suspend) a targe…☆43Apr 6, 2025Updated last year