☆272Oct 6, 2025Updated 6 months ago
Alternatives and similar repositories for n8n-cybersecurity-projects
Users that are interested in n8n-cybersecurity-projects are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆639Sep 20, 2025Updated 7 months ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 5 months ago
- Hands-on Wireshark projects for beginners to learn network analysis and packet inspection.☆102May 30, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆12Mar 28, 2026Updated last month
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆286Apr 10, 2026Updated 2 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Baseline a Windows System against LOLBAS☆74Feb 2, 2026Updated 2 months ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆17Feb 20, 2026Updated 2 months ago
- ☆149Jun 9, 2025Updated 10 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆39Apr 23, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆35Oct 20, 2024Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- MDE/MDI Defender setup for Ludus☆56Mar 14, 2026Updated last month
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 5 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Lab used for workshop and CTF☆514Feb 3, 2026Updated 2 months ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 10, 2026Updated 2 weeks ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- The official command-line client for spyse.com☆51Oct 17, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 4 months ago
- Hands-on projects for beginners to learn and practice Windows forensics and essential cybersecurity skills☆248Jun 29, 2024Updated last year
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 3 months ago
- 100 Hacking Tools and Resources☆109Jun 27, 2023Updated 2 years ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆11Aug 1, 2021Updated 4 years ago
- ☆64Oct 9, 2023Updated 2 years ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆379Dec 15, 2025Updated 4 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,074Mar 10, 2026Updated last month
- PyVelociraptor contains the python bindings for the Velociraptor API.☆21Apr 18, 2026Updated last week
- This repository contains various public projects created by the owners of Hybrid Brothers☆21Nov 3, 2023Updated 2 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆110Apr 22, 2025Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆230Mar 29, 2025Updated last year