Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
☆653Sep 20, 2025Updated 8 months ago
Alternatives and similar repositories for n8n-CyberSecurity-Workflows
Users that are interested in n8n-CyberSecurity-Workflows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆110Feb 14, 2026Updated 3 months ago
- A comprehensive penetration testing operations dashboard for managing projects, tasks, findings, clients, and assets. Built with Next.js,…☆309Dec 16, 2025Updated 5 months ago
- ☆276Oct 6, 2025Updated 7 months ago
- ☆17Feb 17, 2025Updated last year
- ☆121May 26, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆101Oct 15, 2025Updated 7 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆215Mar 4, 2026Updated 2 months ago
- 🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit☆80Apr 16, 2026Updated last month
- A PowerShell module for the Defender XDR portal☆121Updated this week
- ☆19Sep 1, 2025Updated 8 months ago
- ☆23Apr 16, 2025Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,077May 11, 2026Updated last week
- This C# tool sprays for admin access over the entire domain☆90Dec 7, 2025Updated 5 months ago
- Build AI-powered security tools. 50+ hands-on labs covering ML, LLMs, RAG, threat detection, DFIR, and red teaming. Includes Colab notebo…☆145May 11, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆71Apr 16, 2026Updated last month
- Payload Generation Workflow☆41Jul 18, 2025Updated 10 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆467Feb 18, 2026Updated 3 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 months ago
- A curated list of AI driven Cyber security Resources☆50May 10, 2026Updated last week
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆250Nov 11, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆88Mar 6, 2025Updated last year
- Lab4PurpleSec is a modular Purple Team homelab combining a vulnerable Active Directory environment (GOAD), a Docker-based web DMZ, pfSens…☆224Dec 31, 2025Updated 4 months ago
- Bloodhound Portable for Windows☆54Apr 1, 2023Updated 3 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Run TTPs, with AI!☆132Feb 23, 2026Updated 2 months ago
- ☆250Mar 29, 2025Updated last year
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers t…☆42Jun 10, 2025Updated 11 months ago
- Quick ESXi Log Parser☆31Oct 20, 2025Updated 6 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆149Aug 15, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆302Updated this week
- Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion☆37Nov 13, 2025Updated 6 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆325Mar 27, 2025Updated last year
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆109May 7, 2026Updated last week
- ☆59Dec 10, 2025Updated 5 months ago