Top 144 SecOps automation workflows

Results (144)

Sort: Relevancy

Create Executive Security Briefings with NixGuard AI & Wazuh Alerts

Drowning in security alerts? Spending hours translating technical logs from Wazuh, your SIEM, or other tools into business-friendly reports for leadership? This...

Created by: Jonathan | NEX || nex

Jonathan | NEX

5 months agoFree

  • +1

Intelligent AI Digest for Security, Privacy, and Compliance Feeds

How it works This workflow acts like your own personal AI assistant, automatically fetching and summarizing the most relevant Security, Privacy, and Compliance ...

Created by: Niranjan G || niranjan

Niranjan G

7 months agoFree

🗲 Creating a Secure Webhook - MUST HAVE

How it works This workflow demonstrates a fundamental pattern for securing a webhook by requiring an API key. It acts as a gatekeeper, checking for a valid key...

Created by: Lucas Peyrin || lucaspeyrin

Lucas Peyrin

6 months agoFree

  • +1

Comprehensive SSL Certificate Monitoring with Discord Alerts and Notion Integration

🔐 Advanced SSL Health Monitor 👤 Who is this for? This workflow is designed for DevOps engineers, IT administrators, and security professionals who need compr...

Created by: Tom Cao || tomcao

Tom Cao

6 months agoFree

Automated URL Phishing & Threat Analysis with NixGuard AI

Stop manually checking suspicious links. This free n8n workflow provides the foundation for a powerful, automated URL analysis pipeline. Using the NixGuard AI e...

Created by: Jonathan | NEX || nex

Jonathan | NEX

5 months agoFree

Automate Security Alert Triage with NixGuard AI and Route to Slack or Jira

Are you drowning in a sea of security notifications? Do your analysts spend more time sifting through low-level logs than investigating real threats? This workf...

Created by: Jonathan | NEX || nex

Jonathan | NEX

5 months agoFree

Website Scam Risk Detector with GPT-4o and SerpAPI

What It Does This intelligent workflow simplifies the complex task of determining whether a website is legitimate or potentially a scam. By simply submitting a ...

Created by: AiAgent || lifehacks

AiAgent

6 months agoFree

  • +2

WebSecScan: AI-Powered Website Security Auditor

WebSecScan: AI-Powered Website Security Auditor This n8n workflow provides comprehensive website security analysis by leveraging OpenAI's models to detect vuln...

Created by: Dale Dunlop || daledunlop

Dale Dunlop

9 months agoFree

Subdomain Enumeration with Subfinder, HTTPX & GPT-4-Mini for Security Reconnaissance

Generates a wordlist of 1,000–15,000 subdomains created by an AI agent by correlating detected technologies and recurring patterns. Objective Assist security re...

Created by: Javier Rieiro || pyus3r

Javier Rieiro

2 months agoFree

Automate Free IP Analysis: NixGuard AI Summaries & Wazuh Integration

Supercharge Your Security Operations for Free Stop wasting time manually investigating suspicious IP addresses. This workflow template is your launchpad to aut...

Created by: Jonathan | NEX || nex

Jonathan | NEX

5 months agoFree

  • +2

AI Privacy-Minded Router: PII Detection for Privacy, Security, & Compliance

Modern AI systems are powerful but pose privacy risks when handling sensitive data. Organizations need AI capabilities while ensuring: ✅ Sensitive data never...

Created by: Charles || codetender

Charles

5 months agoFree

Monitor Software Compliance with Jamf Patch Summaries in Slack

🧩 Jamf Patch Summary to Slack Stay on top of software patch compliance by automatically posting Jamf patch summaries to Slack. This helps IT and security teams...

Created by: Jean-Marie Rizkallah  || mrrobot

Jean-Marie Rizkallah

6 months agoFree

  • +2

AI-Powered Vendor Policy & RSS Feed Analysis with Integrated Risk Scoring

🧠 Overview A dual-engine, AI-driven n8n workflow that automates the monitoring of both vendor policy webpages and compliance-related RSS feeds. It intelligent...

Created by: Kamalraj || kamalraj

Kamalraj

6 months agoFree

SSL Certificate Expiry Notifier (No Paid APIs)

Great — here’s a complete Workflow Description for your n8n Creator submission based on the JSON you shared: 🔒 SSL Expiry Notifier (No Paid APIs) 🧩 How it W...

Created by: Evoort Solutions || evoortsolutions

Evoort Solutions

7 months agoFree

Secure User Emails with AES-256 Encryption and Verification System

🔐 Email Encryption Masterclass Professional-Grade AES-256 Data Protection for n8n How It Works This comprehensive workflow demonstrates enterprise-level emai...

Created by: David Olusola || dae221

David Olusola

6 months ago$8

  • +1

Automated SSL Certificate Monitoring and Renewal with Notion and Telegram

Automatically fetch existing domains from Notion's Database and verify the validity of SSL certificates through SSL-Checker. If the validity period is less than...

Created by: Frank Chen || frankchen

Frank Chen

6 months agoFree

Network Vulnerability Scanner with NMAP and Automated CVE Reporting

Network Vulnerability Scanner (used NMAP as engine) with Automated CVE Report Workflow Overview This n8n workflow provides comprehensive network vulnerability...

Created by: Vigh Sandor || vighsandor

Vigh Sandor

a month agoFree

Track CVE Vulnerability Details & History with NVD API and Google Sheets

Who is this for? NVD (National Vulnerability Database) data is essential for security analysts, vulnerability managers, and DevSecOps professionals who need to...

Created by: Niranjan G || niranjan

Niranjan G

7 months agoFree

Get Real-Time Security Insights with NixGuard RAG and Wazuh Integration

Effortlessly integrate NixGuard API into your n8n workflows for real-time security insights using your API key. This connector enables seamless interaction with...

Created by: Jonathan | NEX || nex

Jonathan | NEX

7 months agoFree

Web Security Scanner for OWASP Compliance with Markdown Reports

How the n8n OWASP Scanner Works & How to Set It Up How It Works (Simple Flow): Input**: Enter target URL + endpoint (e.g., https://example.com, /login) Scan**:...

Created by: Sean Birmingham || knute

Sean Birmingham

a month agoFree

Automated GitHub Scanner for Exposed AWS IAM Keys

Automated GitHub Scanner for Exposed AWS IAM Keys Overview This n8n workflow automatically scans GitHub for exposed AWS IAM access keys associated with your A...

Created by: Niranjan G || niranjan

Niranjan G

6 months agoFree

Discord Server Anti-Impersonation / Scammer Tracker with Data Tables

Discord Member Change Tracker This n8n template demonstrates how to automatically monitor and track username and nickname changes across your Discord server me...

Created by: Cj Elijah Garay || elijahbuilds-ai

Cj Elijah Garay

10 days ago$25

  • +3

Automated AWS IAM Key Compromise Response with Slack & Claude AI

🛡️ Automated AWS Key Compromise Remediation Description This n8n workflow provides a secure, enterprise-grade response system for AWS IAM access key compromi...

Created by: Niranjan G || niranjan

Niranjan G

6 months agoFree

  • +3

Automated Lead Generation & Qualification with Google Maps, GPT-4 & HubSpot

This n8n workflow automates CVE tracking by retrieving vulnerability details from the NVD API 🛡️, organizing and updating the data in Google Sheets 📊, and opt...

Created by: David Olusola || dae221

David Olusola

7 months ago$49

Monitor Data Breaches in Real-time with Have I Been Pwned

Who is this for? Security professionals Developers Individuals interested in data breach awareness Use Case Automated monitoring for new breaches Proactive id...

Created by: Audun || xqus

Audun

9 months agoFree

  • +7

Automate SIEM Alert Enrichment with MITRE ATT&CK, Qdrant & Zendesk in n8n

n8n Workflow: Automate SIEM Alert Enrichment with MITRE ATT&CK & Qdrant Who is this for? This workflow is ideal for: Cybersecurity teams & SOC analysts* ...

Created by: Angel Menendez || djangelic

Angel Menendez

a year agoFree

  • +1

Auto CVE & IOC Feed Ingestor with OpenAI Risk Triage & Email Alerts

How it works This Blue Team workflow ingests threat intelligence from public CVE and IOC feeds, merges the data, performs automated triage using OpenAI, and r...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$29

🛠️ TheHive Tool MCP Server

Need help? Want access to this workflow + many more paid workflows + live Q&A sessions with a top verified n8n creator? Join the community Complete MCP server...

Created by: David Ashby || cfomodz

David Ashby

6 months ago$15

SSL Expiry Alert with SSL-Checker.io

Use Case Managing SSL certificates manually can be time-consuming and error-prone, often leading to unexpected downtime or security risks due to expired certi...

Created by: Vishal Kumar || vishalquantana

Vishal Kumar

a year agoFree

n8n Enterprise AI Security Firewall — Guardrails for Secure Agents

🛡️ n8n Guardrails: Risk Ranking This workflow provides a complete testing rig for evaluating text against seven essential AI guardrails used in production sys...

Created by: Sandeep Patharkar | www.FastTrackAiMastery.com || sandy4v

Sandeep Patharkar | www.FastTrackAiMastery.com

a month ago$49

  • +2

CYBERPULSE AI GRC: Automate Security Questionnaire Responses

Description Automates vendor/customer security questionnaire responses. It ingests a questionnaire (Sheet/CSV/XLSX), matches each question to your approved an...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

4 months ago$49

Automated DNS Records Lookup for Subdomains with HackerTarget API Reports

🧠 EnumX: Auto DNS Lookup for Subdomains with Markdown Export Who’s it for Security engineers, red teamers, or automation-curious teams looking to enhance pas...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$29

  • +2

OTX & OpenAI Web Security Check

This n8n workflow automates website security audits. It combines direct website scanning, threat intelligence from AlienVault OTX, and advanced analysis from an...

Created by: Sean Birmingham || knute

Sean Birmingham

6 months agoFree

Audit Google Drive File Permissions for Access Control Management

This n8n template reviews and audits recently active Google Drive files and reports on files with excessively open permissions. This shows how you can automate ...

Created by: Jimleuk || jimleuk

Jimleuk

8 months agoFree

  • +1

Monitor SSL Certificate Expiry with Google Sheets and Multi-Channel Alert

SSL Expiry Alert System Who is this for? This workflow is ideal for administrators or IT professionals responsible for monitoring SSL certificates of multiple ...

Created by: Jesse Davids || cultrix

Jesse Davids

9 months agoFree

  • +1

Analyze & Sort Suspicious Email Contents with ChatGPT

Analyze & Sort Suspicious Email Contents with ChatGPT and Jira Who is this for? This workflow is tailored for IT security teams, managed service providers (MSP...

Created by: Angel Menendez || djangelic

Angel Menendez

a year agoFree

Generate Security Vulnerability Reports with Google Dorks, SerpAPI and PDF4me

Google Dorks with SerpAPI How it Works: Accepts a domain from a web form Generates a list of Google dorks targeting that domain Scrapes Google search results f...

Created by: Sean Birmingham || knute

Sean Birmingham

a month agoFree

  • +1

IP Threat Intelligence Report Generator with VirusTotal, OpenAI and Google Docs

Cybersec IP Intelligence Gatherer This project utilizes the VirusTotal node and Geolocation node to thoroughly gather data on a provided IP address. From ther...

Created by: Sean Birmingham || knute

Sean Birmingham

a month agoFree

Automate External Attack Surface Mapping with Shodan API and DNS Lookups

The Bug Bounty Target Recon n8n workflow is a powerful automation tool for security professionals and ethical hackers. It efficiently automates the time-consum...

Created by: Sean Birmingham || knute

Sean Birmingham

a month agoFree

CYBERPULSE AI GRC: Automate PCI DSS Control Evaluation and Compliance Tracking

Description Automatically evaluates PCI DSS control responses using logic or AI. Designed to speed up compliance workflows, reduce audit fatigue, and flag non-...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$49

🛠️ Elastic Security Tool MCP Server 💪 all 14 operations

Need help? Want access to this workflow + many more paid workflows + live Q&A sessions with a top verified n8n creator? Join the community Complete MCP server...

Created by: David Ashby || cfomodz

David Ashby

6 months ago$45

MFA Multi-factor authentication (Voice call and Email) with ClickSend and SMTP

This workflow automates the process of sending voice calls for verification purposes and combines it with email verification. It uses the ClickSend API for voic...

Created by: Davide || n3witalia

Davide

9 months agoFree

Monitor Authentication IPs from SaaS Alerts & Email Reports via SMTP2Go

Collect and Email Authentication IP Addresses from SaaS Alerts (Last 24 Hours) Description This n8n workflow automates the process of collecting sign-in IP a...

Created by: Benjamin Jones (SaaS Alerts) || benjones-saasalerts

Benjamin Jones (SaaS Alerts)

10 months agoFree

Analyze Email Headers for IP Reputation and Spoofing Detection - Gmail

Analyze Emails for Security Insights Who is this for? This workflow is ideal for IT professionals, security analysts, and organizations looking to enhance the...

Created by: Angel Menendez || djangelic

Angel Menendez

a year agoFree

Analyze Email Headers for IP Reputation and Spoofing Detection - Outlook

Analyze Emails for Security Insights Who is this for? This workflow is ideal for security teams, IT Ops professionals, and managed service providers (MSPs) re...

Created by: Angel Menendez || djangelic

Angel Menendez

a year agoFree

  • +1

Analyze Suspicious Email Contents with ChatGPT Vision

Phishing Email Detection and Reporting with n8n Who is this for? This workflow is designed for IT teams, security professionals, and managed service providers ...

Created by: Angel Menendez || djangelic

Angel Menendez

a year agoFree

  • +2

Phishing Analysis - URLScan.io and VirusTotal

This n8n workflow automates the analysis of email messages received in a Microsoft Outlook inbox to identify indicators of compromise (IOCs), specifically suspi...

Created by: n8n Team || n8n-team

n8n Team

2 years agoFree

  • +4

Intelligent Real-Time Financial Fraud Detection and Risk Scoring Engine

How It Works Automates fraud risk detection for financial transactions by analyzing real-time webhook events through AI-powered scoring. Target audience: fintec...

Created by: Cheng Siong Chin || cschin

Cheng Siong Chin

9 days agoFree

  • +1

Automate Vulnerability Triage from Snyk with Jira, Slack & Airtable Integration

Snyk Vulnerability Automation Workflow with Webhook, Jira, Slack & Airtable This workflow receives vulnerability data(e.g., Snyk, Dependabot or any security sc...

Created by: WeblineIndia || weblineindia

WeblineIndia

10 days agoFree

  • +3

Monitor Compliance with GPT-4 Analysis of System Logs and Generate Audit Reports

How It Works This solution centralizes communication data from Slack, Microsoft Teams, Gmail, and GitHub into a unified AI-powered analysis and documentation w...

Created by: Cheng Siong Chin || cschin

Cheng Siong Chin

11 days agoFree

  • +1

Track Software Security Patents with ScrapeGraphAI, Notion, and Pushover Alerts

Software Vulnerability Tracker with Pushover and Notion ⚠️ COMMUNITY TEMPLATE DISCLAIMER: This is a community-contributed template that uses ScrapeGraphAI (a...

Created by: vinci-king-01 || vinci-king-01

vinci-king-01

16 days agoFree

Monitor Zoho CRM Changes & Alert on Suspicious Activity with Google Sheets

📄 Zoho CRM Change Tracking & Automated Suspicious Activity Alerts Workflow This n8n workflow automatically monitors selected Zoho CRM modules for record chang...

Created by: WeblineIndia || weblineindia

WeblineIndia

21 days agoFree

  • +1

Automated Failed Login Detection with Jira Tasks, Slack Alerts & Notion Logging

Automated Failed Login Detection with Jira Security Tasks, Slack Notifications Webhook: Failed Login Attempts → Jira Security Case → Slack Warnings This n8n w...

Created by: WeblineIndia || weblineindia

WeblineIndia

a month agoFree

  • +3

Audit Website Security Headers with AI Remediation and Google Sheets Reporting

What It Is An automated workflow for auditing website security headers and generating comprehensive security reports. The workflow consists of three mai...

Created by: Ari Nakos || just-aristides

Ari Nakos

a month ago$19

  • +2

Scan Single URLs for Security Vulnerabilities with GPT-4 (JS, PHP, Python)

Overview This workflow automates static security analysis for JavaScript, PHP, and Python codebases. It’s designed for bug bounty hunters and security researc...

Created by: Javier Rieiro || pyus3r

Javier Rieiro

a month agoFree

  • +2

Automate CVE Detection with AI-Powered Nuclei Template Generation & Google Drive

Short description Automates collection, technical extraction, and automatic generation of Nuclei templates from public CVE PoCs. Converts verified PoCs into r...

Created by: Javier Rieiro || pyus3r

Javier Rieiro

2 months agoFree

Automated Weekly Security Audit Reports with Gmail Delivery

🔒 N8N Security Audit Report - Automated Weekly Email 🎯 What does this workflow do? This workflow automatically generates and emails a comprehensive security...

Created by: Matthieu || neon8n

Matthieu

2 months agoFree

Automated CVE Scanning of Bug Bounty Programs with Nuclei and Project Discovery

Description Automates daily CVE-driven scanning against bug bounty scopes. It fetches bug-bounty domains, pulls newly published Project Discovery templates, con...

Created by: Javier Rieiro || pyus3r

Javier Rieiro

2 months agoFree

  • +1

Monitor Jamf Policy Integrity and Send Slack Alerts for Changes

🛡️ Jamf Policy Integrity Monitor 🎯 Overview A security-focused n8n workflow that monitors Jamf Pro policies for any unauthorized or accidental modification....

Created by: Jean-Marie Rizkallah  || mrrobot

Jean-Marie Rizkallah

3 months agoFree

IP Geolocation & HTTP Port Scanning with Google Sheets

Automate IP geolocation and HTTP port scanning with Google Sheets trigger This n8n template automatically enriches IP addresses with geolocation data and perfo...

Created by: IranServer.com || iranserver

IranServer.com

3 months agoFree

Generate Domain Insights with WHOIS Lookup and GPT-5-Nano via RapidAPI

This template allows you to automatically fetch WHOIS data for any domain and display it in a clean, modern HTML card. It doesn’t just stop at showing raw regis...

Created by: Oriol Seguí || oxsr11

Oriol Seguí

3 months agoFree

Monitor SSL Certificate Expiry Dates with Google Sheets & Slack Alerts

> ⚠️ Notice: > Community nodes like @custom-js/n8n-nodes-pdf-toolkit can only be installed on self-hosted instances of n8n. This n8n workflow illu...

Created by: CustomJS || customjs

CustomJS

6 months agoFree

Track Policy Expiry Dates and Ownership with Google Sheets and Gmail Notifications

Purpose Automates the monitoring of policy documents for expiry and ownership gaps. Ensures accountability by sending proactive notifications when policies are ...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

4 months ago$49

Automate Risk Treatment Tasks with Google Sheets for GRC Compliance

Description Automatically assigns and escalates risk treatment tasks based on severity, organizational unit, and asset class. Removes manual owner-assignment s...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

4 months ago$49

  • +5

Check Suspicious Links via Telegram with GPT-4 Analysis of VirusTotal & urlscan.io Results

Workflow Purpose The workflow is designed to scan submitted URLs using urlscan.io and VirusTotal, combine the results into a single structured summary, and send...

Created by: Michael Gullo || mgullo

Michael Gullo

4 months agoFree

  • +1

IAM Compliance Automation: Enforce MFA and Clean Up Access Keys in AWS

Automated AWS IAM Compliance Workflow for MFA Enforcement and Access Key Deactivation > This workflow leverages AWS IAM APIs and n8n automation to ensure str...

Created by: Trung Tran || trungtran

Trung Tran

4 months agoFree

Send Slack Alerts for AWS IAM Access Keys Older Than 365 Days

AWS IAM Access Key Rotation Reminder Automation Workflow Watch the demo video below: Who’s it for DevOps/SRE teams responsible for AWS account security. Secu...

Created by: Trung Tran || trungtran

Trung Tran

4 months agoFree

Monitor & Alert on Inactive AWS IAM Users with Slack Notifications

AWS IAM Inactive User Automation Alert Workflow > Weekly job that finds IAM users with no activity for > 90 days and notifies a Slack channel. > ⚠️ ...

Created by: Trung Tran || trungtran

Trung Tran

4 months agoFree

Auto-Renew AWS Certificates with Slack Approval Workflow

AWS Certificate Manager (ACM) Auto-Renew with Slack notify & approval Who’s it for SRE/DevOps teams managing many ACM certs. Cloud ops who want hands-off renew...

Created by: Trung Tran || trungtran

Trung Tran

4 months agoFree

Prevent Prompt Injection Attacks with a GPT-4O Security Defense System

AI Security Pipeline - Prompt Injection Defense System using GPT-4O Protect your AI workflows from prompt injection attacks, XSS attempts, and malicious conten...

Created by: inderjeet Bhambra || idsinghbhambra

inderjeet Bhambra

4 months agoFree

  • +5

Filter Cybersecurity News for Your Tech Stack (OpenAI + Pinecone RAG)

What it does: Collects cybersecurity news from trusted RSS feeds and uses OpenAI’s Retrieval-Augmented Generation (RAG) capabilities with Pinecone to filter for...

Created by: Will Carlson || will-carlson

Will Carlson

5 months agoFree

Automated Wazuh Rule Deployment Pipeline with GitHub, XML Validation & Telegram Alerts

🚀 Say Goodbye to Manual Rule Deployments in Wazuh! Just Commit— Let Your Pipeline Auto‑Deploy via GitHub + n8n 🎯 👨‍💻 Tired of This Endless Cycle? Create ...

Created by: mariskarthick || mariskarthick

mariskarthick

4 months ago$60

  • +1

Automate AI Vulnerability Monitoring with GPT-4 and ServiceNow Incident Creation

This n8n workflow automatically monitors RSS feeds for the latest AI vulnerability news, extracts key threat details, and creates a corresponding Security Incid...

Created by: Tushar Mishra || yajna

Tushar Mishra

4 months agoFree

  • +1

Automate CVE Monitoring with OpenAI Processing for ServiceNow Security Incidents

This n8n workflow automatically fetches the latest CVE data at scheduled intervals, extracts relevant security details, and creates a corresponding Security Inc...

Created by: Tushar Mishra || yajna

Tushar Mishra

4 months agoFree

  • +2

Triage AWS Security Misconfigurations with GPT-4.1 Mini and Send Alerts to Gmail

What this workflow does Automatically triages risky AWS misconfigurations and alerts your team. Pipeline: Security Hub or AWS Config -> EventBridge rules -...

Created by: Calistus Christian || ca7ai

Calistus Christian

4 months agoFree

  • +3

AI-Powered Domain & IP Security Check Automation

Description This workflow is designed to automate the security reputation check of domains and IP addresses using multiple APIs such as VirusTotal, AbuseIPDB...

Created by: Garri || garri

Garri

5 months agoFree

Scan URLs for Security Threats with urlscan.io and GPT-4o mini

How it works • Webhook → urlscan.io → GPT-4o mini → Gmail • Payload example: { "url": "https://example.com" } • urlscan.io returns a Scan ID and raw JSON. ...

Created by: Calistus Christian || ca7ai

Calistus Christian

5 months agoFree

  • +2

Cybersecurity Assistant with GPT-4, Telegram Bot & Command Execution

QuantumDefender AI is a next-generation intelligent cybersecurity assistant designed to harness the symbolic strength of quantum computing’s promise alongside c...

Created by: mariskarthick || mariskarthick

mariskarthick

5 months agoFree

  • +1

Auto Remediate Endpoint Infections with Wazuh, ClamAV, and GPT-4

Reduce human delays between malware detection and remediation in MSSP/SOC environments. This workflow automates full endpoint antivirus scanning immediately aft...

Created by: mariskarthick || mariskarthick

mariskarthick

5 months agoFree

Automate Wazuh Alert Triage and Reporting with GPT-4o-mini and Telegram

🚨Are alert storms overwhelming your Security Operations workflows? This n8n workflow supercharges your SOC by fully automating triage, analysis, and notificat...

Created by: mariskarthick || mariskarthick

mariskarthick

5 months agoFree

SSL/TLS Certificate Expiry Monitor with Slack Alert

How It Works: The 5-Node Certificate Management Flow 🗓️ This workflow efficiently monitors your domains for certificate expiry. Scheduled Check (Cron Node): ...

Created by: Marth || marth

Marth

5 months agoFree

Scan URLs with urlscan.io and Send Results via Gmail

Overview Receive a URL via Webhook, submit it to urlscan.io, wait ~30 seconds for artifacts (e.g., screenshot), then email a clean summary with links to the res...

Created by: Calistus Christian || ca7ai

Calistus Christian

5 months ago$1

Monitor Security Logs for Failed Login Attempts with Slack Alerts

How It Works: The 5-Node Anomaly Detection Flow This workflow efficiently processes logs to detect anomalies. Scheduled Check (Cron Node): This is the primary...

Created by: Marth || marth

Marth

5 months agoFree

Monitor Email Data Breaches with HIBP API and Send Slack Alerts

How It Works: The 5-Node Security Flow This workflow efficiently performs a scheduled data breach scan. Scheduled Check (Cron Node) This is the workflow's tri...

Created by: Marth || marth

Marth

5 months agoFree

Monitor Domains & IPs on AbuseIPDB Blacklist with Slack Alerts

⚙ How It Works The automated blacklist monitor is designed to be a proactive, not reactive, tool. Here is the high-level process: Scheduled Checks: At regula...

Created by: Marth || marth

Marth

5 months agoFree

Monitor Remote Server File Integrity with SSH and Slack Alerts

How It Works: The 5-Node Security Flow This workflow efficiently performs a scheduled file integrity audit. Scheduled Check (Cron Node) This is the workflow's...

Created by: Marth || marth

Marth

5 months agoFree

Monitor CISA Critical Vulnerability Alerts with RSS Feed & Slack Notifications

How It Works: The 5-Node Monitoring Flow This concise workflow efficiently captures, filters, and delivers crucial cybersecurity-related mentions. Monitor: Cy...

Created by: Marth || marth

Marth

5 months agoFree

Monitor Cybersecurity Brand Mentions on X and Send Alerts to Slack

How It Works: The 5-Node Monitoring Flow This concise workflow efficiently captures, filters, and delivers crucial cybersecurity-related mentions. Monitor: Cy...

Created by: Marth || marth

Marth

5 months agoFree

  • +3

Fraudulent Booking Detector: Identify Suspicious Travel Transactions with Google Gemini

This automated n8n workflow detects and manages fraudulent booking transactions through comprehensive AI-powered analysis and multi-layered security checks. The...

Created by: Oneclick AI Squad || oneclick-ai

Oneclick AI Squad

5 months agoFree

CYBERPULSE AI RedOps: Validate Email Security Gateways Generated Payloads

Description: Automatically send structured benign payloads (PDF/HTML/JS markers) to test email gateways and sandbox response. AI-generated phishing-style conten...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$49

CYBERPULSE AI RedOps: Phishing Simulation with Redirect Tracking

Description: Simulate cloaked phishing links that redirect through a controlled proxy. This module tracks if secure email gateways (SEGs) or sandboxes trigger t...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$49

CYBERPULSE AI RedOps: Generate Daily RedOps Security Simulation Reports

Description Automatically compiles a daily HTML report of all RedOps simulations (Modules 1–5), summarizing offensive activity, response logs, and module effect...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$49

CYBERPULSE AI RedOps: Credential Trap Sim: Fake Login Page Simulation

📝 Description: Simulate a phishing login page to test user behavior and SOC response. This controlled workflow sends trap links to predefined targets and logs ...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$49

  • +1

CYBERPULSE AI RedOps: Internal Phishing Simulation for Security Training

Description: Simulate phishing awareness campaigns using OpenAI-generated emails. Send to target lists, log clicks with a webhook, and store results in Google ...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$49

Export Jamf Policies to Slack as CSV for Instant Auditing

🧩 Jamf Policies Export to Slack Quickly export and review your entire Jamf policy configuration—including triggers, frequencies, and scope—directly in Slack. T...

Created by: Jean-Marie Rizkallah  || mrrobot

Jean-Marie Rizkallah

5 months agoFree

  • +1

Real-Time Security Threat Dashboard with Google Sheets, AI Risk Analysis & Email Alerts

👤 Who it’s for Blue Team leads, CISOs, and SOC managers who want automated visibility into threat metrics, endpoint alerts, and response actions — without need...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$29

Automate Security Incident Response with Google Sheets, Email Alerts and EDR Isolation

👤 Who it’s for SOC teams, incident responders, or solo defenders who need to automatically act on critical threats without manual triage. Ideal for BlueOps us...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$29

Auto-Classify Security Incidents with GPT-4 and Google Sheets for SOC Teams

👤 Who it’s for Blue Team leads, SOC analysts, and IT responders looking to automatically classify security alerts using AI-driven logic and asset-based risk si...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$29

Aggregate Endpoint Security Risk Scores with EDR, Vulnerability Data & Google Sheets

👤 Who it’s for Security teams, SOC analysts, and small-to-mid IT teams looking to automatically assess endpoint risk by combining known vulnerabilities with in...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$29

CYBERPULSE AI BlueOps: Asset Enrichment Engine

👤 Who it’s for Blue teamers, SOC operators, cyber analysts, and SME defenders who want to automatically enrich daily CVE/IOC threats by matching them to their ...

Created by: Adnan Tariq || adnantariq

Adnan Tariq

5 months ago$29

Showing 100 out of 144 templates

Need inspiration? What’s in your stack?

Verified Creators

Become a creator

Submit your template to the n8n template library, get featured, and earn via our affiliates program.

Submit a template
FAQs

FAQs about SecOps automation workflows

What is SecOps automation?

What are some examples of SecOps workflows in n8n?

Can n8n integrate with my existing SecOps tools?

How do I get started with SecOps automation using n8n?

How secure are the workflows created in n8n?

How does n8n’s pricing model benefit me when automating SecOps workflows?