Results (144)
Drowning in security alerts? Spending hours translating technical logs from Wazuh, your SIEM, or other tools into business-friendly reports for leadership? This...
Jonathan | NEX
⋅5 months ago⋅Free
How it works This workflow acts like your own personal AI assistant, automatically fetching and summarizing the most relevant Security, Privacy, and Compliance ...
Niranjan G
⋅7 months ago⋅Free
How it works This workflow demonstrates a fundamental pattern for securing a webhook by requiring an API key. It acts as a gatekeeper, checking for a valid key...
Lucas Peyrin
⋅6 months ago⋅Free
🔐 Advanced SSL Health Monitor 👤 Who is this for? This workflow is designed for DevOps engineers, IT administrators, and security professionals who need compr...
Tom Cao
⋅6 months ago⋅Free
Stop manually checking suspicious links. This free n8n workflow provides the foundation for a powerful, automated URL analysis pipeline. Using the NixGuard AI e...
Jonathan | NEX
⋅5 months ago⋅Free
Are you drowning in a sea of security notifications? Do your analysts spend more time sifting through low-level logs than investigating real threats? This workf...
Jonathan | NEX
⋅5 months ago⋅Free
What It Does This intelligent workflow simplifies the complex task of determining whether a website is legitimate or potentially a scam. By simply submitting a ...
AiAgent
⋅6 months ago⋅Free
WebSecScan: AI-Powered Website Security Auditor This n8n workflow provides comprehensive website security analysis by leveraging OpenAI's models to detect vuln...
Dale Dunlop
⋅9 months ago⋅Free
Generates a wordlist of 1,000–15,000 subdomains created by an AI agent by correlating detected technologies and recurring patterns. Objective Assist security re...
Javier Rieiro
⋅2 months ago⋅Free
Supercharge Your Security Operations for Free Stop wasting time manually investigating suspicious IP addresses. This workflow template is your launchpad to aut...
Jonathan | NEX
⋅5 months ago⋅Free
Modern AI systems are powerful but pose privacy risks when handling sensitive data. Organizations need AI capabilities while ensuring: ✅ Sensitive data never...
Charles
⋅5 months ago⋅Free
🧩 Jamf Patch Summary to Slack Stay on top of software patch compliance by automatically posting Jamf patch summaries to Slack. This helps IT and security teams...
Jean-Marie Rizkallah
⋅6 months ago⋅Free
🧠 Overview A dual-engine, AI-driven n8n workflow that automates the monitoring of both vendor policy webpages and compliance-related RSS feeds. It intelligent...
Kamalraj
⋅6 months ago⋅Free
Great — here’s a complete Workflow Description for your n8n Creator submission based on the JSON you shared: 🔒 SSL Expiry Notifier (No Paid APIs) 🧩 How it W...
Evoort Solutions
⋅7 months ago⋅Free
🔐 Email Encryption Masterclass Professional-Grade AES-256 Data Protection for n8n How It Works This comprehensive workflow demonstrates enterprise-level emai...
David Olusola
⋅6 months ago⋅$8
Automatically fetch existing domains from Notion's Database and verify the validity of SSL certificates through SSL-Checker. If the validity period is less than...
Frank Chen
⋅6 months ago⋅Free
Network Vulnerability Scanner (used NMAP as engine) with Automated CVE Report Workflow Overview This n8n workflow provides comprehensive network vulnerability...
Vigh Sandor
⋅a month ago⋅Free
Who is this for? NVD (National Vulnerability Database) data is essential for security analysts, vulnerability managers, and DevSecOps professionals who need to...
Niranjan G
⋅7 months ago⋅Free
Effortlessly integrate NixGuard API into your n8n workflows for real-time security insights using your API key. This connector enables seamless interaction with...
Jonathan | NEX
⋅7 months ago⋅Free
How the n8n OWASP Scanner Works & How to Set It Up How It Works (Simple Flow): Input**: Enter target URL + endpoint (e.g., https://example.com, /login) Scan**:...
Sean Birmingham
⋅a month ago⋅Free
Automated GitHub Scanner for Exposed AWS IAM Keys Overview This n8n workflow automatically scans GitHub for exposed AWS IAM access keys associated with your A...
Niranjan G
⋅6 months ago⋅Free
Discord Member Change Tracker This n8n template demonstrates how to automatically monitor and track username and nickname changes across your Discord server me...
Cj Elijah Garay
⋅10 days ago⋅$25
🛡️ Automated AWS Key Compromise Remediation Description This n8n workflow provides a secure, enterprise-grade response system for AWS IAM access key compromi...
Niranjan G
⋅6 months ago⋅Free
This n8n workflow automates CVE tracking by retrieving vulnerability details from the NVD API 🛡️, organizing and updating the data in Google Sheets 📊, and opt...
David Olusola
⋅7 months ago⋅$49
Who is this for? Security professionals Developers Individuals interested in data breach awareness Use Case Automated monitoring for new breaches Proactive id...
Audun
⋅9 months ago⋅Free
n8n Workflow: Automate SIEM Alert Enrichment with MITRE ATT&CK & Qdrant Who is this for? This workflow is ideal for: Cybersecurity teams & SOC analysts* ...
Angel Menendez
⋅a year ago⋅Free
How it works This Blue Team workflow ingests threat intelligence from public CVE and IOC feeds, merges the data, performs automated triage using OpenAI, and r...
Adnan Tariq
⋅5 months ago⋅$29
Need help? Want access to this workflow + many more paid workflows + live Q&A sessions with a top verified n8n creator? Join the community Complete MCP server...
David Ashby
⋅6 months ago⋅$15
Use Case Managing SSL certificates manually can be time-consuming and error-prone, often leading to unexpected downtime or security risks due to expired certi...
Vishal Kumar
⋅a year ago⋅Free
🛡️ n8n Guardrails: Risk Ranking This workflow provides a complete testing rig for evaluating text against seven essential AI guardrails used in production sys...
Sandeep Patharkar | www.FastTrackAiMastery.com
⋅a month ago⋅$49
Description Automates vendor/customer security questionnaire responses. It ingests a questionnaire (Sheet/CSV/XLSX), matches each question to your approved an...
Adnan Tariq
⋅4 months ago⋅$49
🧠 EnumX: Auto DNS Lookup for Subdomains with Markdown Export Who’s it for Security engineers, red teamers, or automation-curious teams looking to enhance pas...
Adnan Tariq
⋅5 months ago⋅$29
This n8n workflow automates website security audits. It combines direct website scanning, threat intelligence from AlienVault OTX, and advanced analysis from an...
Sean Birmingham
⋅6 months ago⋅Free
This n8n template reviews and audits recently active Google Drive files and reports on files with excessively open permissions. This shows how you can automate ...
Jimleuk
⋅8 months ago⋅Free
SSL Expiry Alert System Who is this for? This workflow is ideal for administrators or IT professionals responsible for monitoring SSL certificates of multiple ...
Jesse Davids
⋅9 months ago⋅Free
Analyze & Sort Suspicious Email Contents with ChatGPT and Jira Who is this for? This workflow is tailored for IT security teams, managed service providers (MSP...
Angel Menendez
⋅a year ago⋅Free
Google Dorks with SerpAPI How it Works: Accepts a domain from a web form Generates a list of Google dorks targeting that domain Scrapes Google search results f...
Sean Birmingham
⋅a month ago⋅Free
Cybersec IP Intelligence Gatherer This project utilizes the VirusTotal node and Geolocation node to thoroughly gather data on a provided IP address. From ther...
Sean Birmingham
⋅a month ago⋅Free
The Bug Bounty Target Recon n8n workflow is a powerful automation tool for security professionals and ethical hackers. It efficiently automates the time-consum...
Sean Birmingham
⋅a month ago⋅Free
Description Automatically evaluates PCI DSS control responses using logic or AI. Designed to speed up compliance workflows, reduce audit fatigue, and flag non-...
Adnan Tariq
⋅5 months ago⋅$49
Need help? Want access to this workflow + many more paid workflows + live Q&A sessions with a top verified n8n creator? Join the community Complete MCP server...
David Ashby
⋅6 months ago⋅$45
This workflow automates the process of sending voice calls for verification purposes and combines it with email verification. It uses the ClickSend API for voic...
Davide
⋅9 months ago⋅Free
Collect and Email Authentication IP Addresses from SaaS Alerts (Last 24 Hours) Description This n8n workflow automates the process of collecting sign-in IP a...
Benjamin Jones (SaaS Alerts)
⋅10 months ago⋅Free
Analyze Emails for Security Insights Who is this for? This workflow is ideal for IT professionals, security analysts, and organizations looking to enhance the...
Angel Menendez
⋅a year ago⋅Free
Analyze Emails for Security Insights Who is this for? This workflow is ideal for security teams, IT Ops professionals, and managed service providers (MSPs) re...
Angel Menendez
⋅a year ago⋅Free
Phishing Email Detection and Reporting with n8n Who is this for? This workflow is designed for IT teams, security professionals, and managed service providers ...
Angel Menendez
⋅a year ago⋅Free
This n8n workflow automates the analysis of email messages received in a Microsoft Outlook inbox to identify indicators of compromise (IOCs), specifically suspi...
n8n Team
⋅2 years ago⋅Free
How It Works Automates fraud risk detection for financial transactions by analyzing real-time webhook events through AI-powered scoring. Target audience: fintec...
Cheng Siong Chin
⋅9 days ago⋅Free
Snyk Vulnerability Automation Workflow with Webhook, Jira, Slack & Airtable This workflow receives vulnerability data(e.g., Snyk, Dependabot or any security sc...
WeblineIndia
⋅10 days ago⋅Free
How It Works This solution centralizes communication data from Slack, Microsoft Teams, Gmail, and GitHub into a unified AI-powered analysis and documentation w...
Cheng Siong Chin
⋅11 days ago⋅Free
Software Vulnerability Tracker with Pushover and Notion ⚠️ COMMUNITY TEMPLATE DISCLAIMER: This is a community-contributed template that uses ScrapeGraphAI (a...
vinci-king-01
⋅16 days ago⋅Free
📄 Zoho CRM Change Tracking & Automated Suspicious Activity Alerts Workflow This n8n workflow automatically monitors selected Zoho CRM modules for record chang...
WeblineIndia
⋅21 days ago⋅Free
Automated Failed Login Detection with Jira Security Tasks, Slack Notifications Webhook: Failed Login Attempts → Jira Security Case → Slack Warnings This n8n w...
WeblineIndia
⋅a month ago⋅Free
What It Is An automated workflow for auditing website security headers and generating comprehensive security reports. The workflow consists of three mai...
Ari Nakos
⋅a month ago⋅$19
Overview This workflow automates static security analysis for JavaScript, PHP, and Python codebases. It’s designed for bug bounty hunters and security researc...
Javier Rieiro
⋅a month ago⋅Free
Short description Automates collection, technical extraction, and automatic generation of Nuclei templates from public CVE PoCs. Converts verified PoCs into r...
Javier Rieiro
⋅2 months ago⋅Free
🔒 N8N Security Audit Report - Automated Weekly Email 🎯 What does this workflow do? This workflow automatically generates and emails a comprehensive security...
Matthieu
⋅2 months ago⋅Free
Description Automates daily CVE-driven scanning against bug bounty scopes. It fetches bug-bounty domains, pulls newly published Project Discovery templates, con...
Javier Rieiro
⋅2 months ago⋅Free
🛡️ Jamf Policy Integrity Monitor 🎯 Overview A security-focused n8n workflow that monitors Jamf Pro policies for any unauthorized or accidental modification....
Jean-Marie Rizkallah
⋅3 months ago⋅Free
Automate IP geolocation and HTTP port scanning with Google Sheets trigger This n8n template automatically enriches IP addresses with geolocation data and perfo...
IranServer.com
⋅3 months ago⋅Free
This template allows you to automatically fetch WHOIS data for any domain and display it in a clean, modern HTML card. It doesn’t just stop at showing raw regis...
Oriol Seguí
⋅3 months ago⋅Free
> ⚠️ Notice: > Community nodes like @custom-js/n8n-nodes-pdf-toolkit can only be installed on self-hosted instances of n8n. This n8n workflow illu...
CustomJS
⋅6 months ago⋅Free
Purpose Automates the monitoring of policy documents for expiry and ownership gaps. Ensures accountability by sending proactive notifications when policies are ...
Adnan Tariq
⋅4 months ago⋅$49
Description Automatically assigns and escalates risk treatment tasks based on severity, organizational unit, and asset class. Removes manual owner-assignment s...
Adnan Tariq
⋅4 months ago⋅$49
Workflow Purpose The workflow is designed to scan submitted URLs using urlscan.io and VirusTotal, combine the results into a single structured summary, and send...
Michael Gullo
⋅4 months ago⋅Free
Automated AWS IAM Compliance Workflow for MFA Enforcement and Access Key Deactivation > This workflow leverages AWS IAM APIs and n8n automation to ensure str...
Trung Tran
⋅4 months ago⋅Free
AWS IAM Access Key Rotation Reminder Automation Workflow Watch the demo video below: Who’s it for DevOps/SRE teams responsible for AWS account security. Secu...
Trung Tran
⋅4 months ago⋅Free
AWS IAM Inactive User Automation Alert Workflow > Weekly job that finds IAM users with no activity for > 90 days and notifies a Slack channel. > ⚠️ ...
Trung Tran
⋅4 months ago⋅Free
AWS Certificate Manager (ACM) Auto-Renew with Slack notify & approval Who’s it for SRE/DevOps teams managing many ACM certs. Cloud ops who want hands-off renew...
Trung Tran
⋅4 months ago⋅Free
AI Security Pipeline - Prompt Injection Defense System using GPT-4O Protect your AI workflows from prompt injection attacks, XSS attempts, and malicious conten...
inderjeet Bhambra
⋅4 months ago⋅Free
What it does: Collects cybersecurity news from trusted RSS feeds and uses OpenAI’s Retrieval-Augmented Generation (RAG) capabilities with Pinecone to filter for...
Will Carlson
⋅5 months ago⋅Free
🚀 Say Goodbye to Manual Rule Deployments in Wazuh! Just Commit— Let Your Pipeline Auto‑Deploy via GitHub + n8n 🎯 👨💻 Tired of This Endless Cycle? Create ...
mariskarthick
⋅4 months ago⋅$60
This n8n workflow automatically monitors RSS feeds for the latest AI vulnerability news, extracts key threat details, and creates a corresponding Security Incid...
Tushar Mishra
⋅4 months ago⋅Free
This n8n workflow automatically fetches the latest CVE data at scheduled intervals, extracts relevant security details, and creates a corresponding Security Inc...
Tushar Mishra
⋅4 months ago⋅Free
What this workflow does Automatically triages risky AWS misconfigurations and alerts your team. Pipeline: Security Hub or AWS Config -> EventBridge rules -...
Calistus Christian
⋅4 months ago⋅Free
Description This workflow is designed to automate the security reputation check of domains and IP addresses using multiple APIs such as VirusTotal, AbuseIPDB...
Garri
⋅5 months ago⋅Free
How it works • Webhook → urlscan.io → GPT-4o mini → Gmail • Payload example: { "url": "https://example.com" } • urlscan.io returns a Scan ID and raw JSON. ...
Calistus Christian
⋅5 months ago⋅Free
QuantumDefender AI is a next-generation intelligent cybersecurity assistant designed to harness the symbolic strength of quantum computing’s promise alongside c...
mariskarthick
⋅5 months ago⋅Free
Reduce human delays between malware detection and remediation in MSSP/SOC environments. This workflow automates full endpoint antivirus scanning immediately aft...
mariskarthick
⋅5 months ago⋅Free
🚨Are alert storms overwhelming your Security Operations workflows? This n8n workflow supercharges your SOC by fully automating triage, analysis, and notificat...
mariskarthick
⋅5 months ago⋅Free
How It Works: The 5-Node Certificate Management Flow 🗓️ This workflow efficiently monitors your domains for certificate expiry. Scheduled Check (Cron Node): ...
Marth
⋅5 months ago⋅Free
Overview Receive a URL via Webhook, submit it to urlscan.io, wait ~30 seconds for artifacts (e.g., screenshot), then email a clean summary with links to the res...
Calistus Christian
⋅5 months ago⋅$1
How It Works: The 5-Node Anomaly Detection Flow This workflow efficiently processes logs to detect anomalies. Scheduled Check (Cron Node): This is the primary...
Marth
⋅5 months ago⋅Free
How It Works: The 5-Node Security Flow This workflow efficiently performs a scheduled data breach scan. Scheduled Check (Cron Node) This is the workflow's tri...
Marth
⋅5 months ago⋅Free
⚙ How It Works The automated blacklist monitor is designed to be a proactive, not reactive, tool. Here is the high-level process: Scheduled Checks: At regula...
Marth
⋅5 months ago⋅Free
How It Works: The 5-Node Security Flow This workflow efficiently performs a scheduled file integrity audit. Scheduled Check (Cron Node) This is the workflow's...
Marth
⋅5 months ago⋅Free
How It Works: The 5-Node Monitoring Flow This concise workflow efficiently captures, filters, and delivers crucial cybersecurity-related mentions. Monitor: Cy...
Marth
⋅5 months ago⋅Free
How It Works: The 5-Node Monitoring Flow This concise workflow efficiently captures, filters, and delivers crucial cybersecurity-related mentions. Monitor: Cy...
Marth
⋅5 months ago⋅Free
This automated n8n workflow detects and manages fraudulent booking transactions through comprehensive AI-powered analysis and multi-layered security checks. The...
Oneclick AI Squad
⋅5 months ago⋅Free
Description: Automatically send structured benign payloads (PDF/HTML/JS markers) to test email gateways and sandbox response. AI-generated phishing-style conten...
Adnan Tariq
⋅5 months ago⋅$49
Description: Simulate cloaked phishing links that redirect through a controlled proxy. This module tracks if secure email gateways (SEGs) or sandboxes trigger t...
Adnan Tariq
⋅5 months ago⋅$49
Description Automatically compiles a daily HTML report of all RedOps simulations (Modules 1–5), summarizing offensive activity, response logs, and module effect...
Adnan Tariq
⋅5 months ago⋅$49
📝 Description: Simulate a phishing login page to test user behavior and SOC response. This controlled workflow sends trap links to predefined targets and logs ...
Adnan Tariq
⋅5 months ago⋅$49
Description: Simulate phishing awareness campaigns using OpenAI-generated emails. Send to target lists, log clicks with a webhook, and store results in Google ...
Adnan Tariq
⋅5 months ago⋅$49
🧩 Jamf Policies Export to Slack Quickly export and review your entire Jamf policy configuration—including triggers, frequencies, and scope—directly in Slack. T...
Jean-Marie Rizkallah
⋅5 months ago⋅Free
👤 Who it’s for Blue Team leads, CISOs, and SOC managers who want automated visibility into threat metrics, endpoint alerts, and response actions — without need...
Adnan Tariq
⋅5 months ago⋅$29
👤 Who it’s for SOC teams, incident responders, or solo defenders who need to automatically act on critical threats without manual triage. Ideal for BlueOps us...
Adnan Tariq
⋅5 months ago⋅$29
👤 Who it’s for Blue Team leads, SOC analysts, and IT responders looking to automatically classify security alerts using AI-driven logic and asset-based risk si...
Adnan Tariq
⋅5 months ago⋅$29
👤 Who it’s for Security teams, SOC analysts, and small-to-mid IT teams looking to automatically assess endpoint risk by combining known vulnerabilities with in...
Adnan Tariq
⋅5 months ago⋅$29
👤 Who it’s for Blue teamers, SOC operators, cyber analysts, and SME defenders who want to automatically enrich daily CVE/IOC threats by matching them to their ...
Adnan Tariq
⋅5 months ago⋅$29
Showing 100 out of 144 templates
Become a creator
Submit your template to the n8n template library, get featured, and earn via our affiliates program.