☆273Oct 6, 2025Updated 6 months ago
Alternatives and similar repositories for n8n-cybersecurity-projects
Users that are interested in n8n-cybersecurity-projects are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 免杀木马样本☆106Oct 11, 2025Updated 5 months ago
- Comunidade Brasileira de Cibersegurança☆23Oct 6, 2025Updated 6 months ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆636Sep 20, 2025Updated 6 months ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 5 months ago
- ☆12Mar 28, 2026Updated last week
- Script to chain search parameters for MalwareBazaar☆14Jan 26, 2025Updated last year
- Baseline a Windows System against LOLBAS☆73Feb 2, 2026Updated 2 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆818Mar 28, 2025Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- ☆148Jun 9, 2025Updated 10 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆40Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated 3 weeks ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 5 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Lab used for workshop and CTF☆510Feb 3, 2026Updated 2 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆84Feb 27, 2026Updated last month
- Hands-on projects for beginners to learn and practice Windows forensics and essential cybersecurity skills☆231Jun 29, 2024Updated last year
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 4 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- The official command-line client for spyse.com☆51Oct 17, 2021Updated 4 years ago
- Libro: Full Red Team: Ethical Hacking: Una guía práctica y profunda sobre hacking ético: técnicas, scripts y estrategias reales para pent…☆30Dec 5, 2025Updated 4 months ago
- Scripts to for ready-to-use Velociraptor instance deployment in Azure☆14Jun 27, 2023Updated 2 years ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆98Jan 27, 2026Updated 2 months ago
- 100 Hacking Tools and Resources☆109Jun 27, 2023Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 6 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆479Oct 29, 2025Updated 5 months ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆261Feb 8, 2026Updated 2 months ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- ☆63Oct 9, 2023Updated 2 years ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated 11 months ago
- Ludus range for the Constructing Defense Lab☆117Updated this week
- ☆375Dec 15, 2025Updated 3 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆183Mar 29, 2025Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,067Mar 10, 2026Updated 3 weeks ago