inthecyber-group / securityonion-n8n-workflowsLinks
Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion
☆29Updated last month
Alternatives and similar repositories for securityonion-n8n-workflows
Users that are interested in securityonion-n8n-workflows are comparing it to the libraries listed below
Sorting:
- A curated list of OSINT MCP servers. Pull requests are welcomed!☆65Updated 8 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆104Updated 6 months ago
- ☆41Updated 9 months ago
- ☆64Updated 4 months ago
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆122Updated last week
- Using MCP is fun with Cyberbro!☆15Updated 2 weeks ago
- A Model Context Protocol (MCP) server for querying the VirusTotal API.☆95Updated 9 months ago
- HoneyAgents is a PoC demo of an AI-driven system that combines honeypots with autonomous AI agents to detect and mitigate cyber threats. …☆58Updated last year
- COMPLETE OSINT CHEAT-SHEET☆114Updated 2 months ago
- MCP server for maigret, a powerful OSINT tool that collects user account information from various public sources.☆215Updated 9 months ago
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆131Updated 2 months ago
- OpenAEV Docker deployment helpers☆26Updated this week
- Proximity is a MCP security scanner powered with NOVA☆265Updated 2 months ago
- MCP Server for Wazuh SIEM☆153Updated last week
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆31Updated last year
- ☆31Updated 10 months ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆28Updated 3 years ago
- Enrich your investigations on IPs, Domains etc. with OSINT☆54Updated last year
- MCP server for dnstwist, a powerful DNS fuzzing tool that helps detect typosquatting, phishing, and corporate espionage.☆41Updated 9 months ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 11 months ago
- ☆133Updated 2 years ago
- A new era for SOCs begins☆23Updated 6 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆29Updated 4 months ago
- Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.☆64Updated 4 months ago
- Here you find the complete list of enrichments and extractionsfor Ubikron.☆30Updated last week
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆144Updated this week
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆223Updated 3 months ago
- The purpose of this document is to outline the security risks and vulnerabilities that may arise when implementing ChatGPT in web applica…☆32Updated 2 weeks ago
- DPULSE - Tool for complex approach to domain OSINT☆155Updated last week
- An AI-powered application that conducts structured interviews to create and maintain detailed personal profiles across various life aspec…☆51Updated 8 months ago