Results (138)
Drowning in security alerts? Spending hours translating technical logs from Wazuh, your SIEM, or other tools into business-friendly reports for leadership? This...
Jonathan | NEX
⋅5 months ago⋅Free
How it works This workflow acts like your own personal AI assistant, automatically fetching and summarizing the most relevant Security, Privacy, and Compliance ...
Niranjan G
⋅6 months ago⋅Free
How it works This workflow demonstrates a fundamental pattern for securing a webhook by requiring an API key. It acts as a gatekeeper, checking for a valid key...
Lucas Peyrin
⋅5 months ago⋅Free
🔐 Advanced SSL Health Monitor 👤 Who is this for? This workflow is designed for DevOps engineers, IT administrators, and security professionals who need compr...
Tom Cao
⋅5 months ago⋅Free
Stop manually checking suspicious links. This free n8n workflow provides the foundation for a powerful, automated URL analysis pipeline. Using the NixGuard AI e...
Jonathan | NEX
⋅5 months ago⋅Free
Are you drowning in a sea of security notifications? Do your analysts spend more time sifting through low-level logs than investigating real threats? This workf...
Jonathan | NEX
⋅5 months ago⋅Free
What It Does This intelligent workflow simplifies the complex task of determining whether a website is legitimate or potentially a scam. By simply submitting a ...
AiAgent
⋅5 months ago⋅Free
WebSecScan: AI-Powered Website Security Auditor This n8n workflow provides comprehensive website security analysis by leveraging OpenAI's models to detect vuln...
Dale Dunlop
⋅8 months ago⋅Free
Generates a wordlist of 1,000–15,000 subdomains created by an AI agent by correlating detected technologies and recurring patterns. Objective Assist security re...
Javier Rieiro
⋅2 months ago⋅Free
Supercharge Your Security Operations for Free Stop wasting time manually investigating suspicious IP addresses. This workflow template is your launchpad to aut...
Jonathan | NEX
⋅5 months ago⋅Free
Modern AI systems are powerful but pose privacy risks when handling sensitive data. Organizations need AI capabilities while ensuring: ✅ Sensitive data never...
Charles
⋅5 months ago⋅Free
🧩 Jamf Patch Summary to Slack Stay on top of software patch compliance by automatically posting Jamf patch summaries to Slack. This helps IT and security teams...
Jean-Marie Rizkallah
⋅5 months ago⋅Free
🧠 Overview A dual-engine, AI-driven n8n workflow that automates the monitoring of both vendor policy webpages and compliance-related RSS feeds. It intelligent...
Kamalraj
⋅5 months ago⋅Free
Great — here’s a complete Workflow Description for your n8n Creator submission based on the JSON you shared: 🔒 SSL Expiry Notifier (No Paid APIs) 🧩 How it W...
Evoort Solutions
⋅6 months ago⋅Free
🔐 Email Encryption Masterclass Professional-Grade AES-256 Data Protection for n8n How It Works This comprehensive workflow demonstrates enterprise-level emai...
David Olusola
⋅5 months ago⋅$8
Automatically fetch existing domains from Notion's Database and verify the validity of SSL certificates through SSL-Checker. If the validity period is less than...
Frank Chen
⋅5 months ago⋅Free
Who is this for? NVD (National Vulnerability Database) data is essential for security analysts, vulnerability managers, and DevSecOps professionals who need to...
Niranjan G
⋅6 months ago⋅Free
Effortlessly integrate NixGuard API into your n8n workflows for real-time security insights using your API key. This connector enables seamless interaction with...
Jonathan | NEX
⋅6 months ago⋅Free
🔒 SSL Certificate Monitoring & Expiry Alert with Spreadsheet [FREE APIs] ✅ What This Workflow Does This n8n template automatically monitors SSL certificates ...
Agus Narestha
⋅5 months ago⋅Free
Automated GitHub Scanner for Exposed AWS IAM Keys Overview This n8n workflow automatically scans GitHub for exposed AWS IAM access keys associated with your A...
Niranjan G
⋅5 months ago⋅Free
Remediate security vulnerabilities with Port This workflow automatically enriches security vulnerability alerts with organizational context from Port and route...
Matan Grady
⋅13 days ago⋅Free
🛡️ Automated AWS Key Compromise Remediation Description This n8n workflow provides a secure, enterprise-grade response system for AWS IAM access key compromi...
Niranjan G
⋅5 months ago⋅Free
This n8n workflow automates CVE tracking by retrieving vulnerability details from the NVD API 🛡️, organizing and updating the data in Google Sheets 📊, and opt...
David Olusola
⋅6 months ago⋅$49
Who is this for? Security professionals Developers Individuals interested in data breach awareness Use Case Automated monitoring for new breaches Proactive id...
Audun
⋅8 months ago⋅Free
n8n Workflow: Automate SIEM Alert Enrichment with MITRE ATT&CK & Qdrant Who is this for? This workflow is ideal for: Cybersecurity teams & SOC analysts* ...
Angel Menendez
⋅10 months ago⋅Free
How it works This Blue Team workflow ingests threat intelligence from public CVE and IOC feeds, merges the data, performs automated triage using OpenAI, and r...
Adnan Tariq
⋅4 months ago⋅$29
Need help? Want access to this workflow + many more paid workflows + live Q&A sessions with a top verified n8n creator? Join the community Complete MCP server...
David Ashby
⋅5 months ago⋅$15
This n8n workflow automates website security audits. It combines direct website scanning, threat intelligence from AlienVault OTX, and advanced analysis from an...
Sean Birmingham
⋅5 months ago⋅$149
Use Case Managing SSL certificates manually can be time-consuming and error-prone, often leading to unexpected downtime or security risks due to expired certi...
Vishal Kumar
⋅a year ago⋅Free
Description Automates vendor/customer security questionnaire responses. It ingests a questionnaire (Sheet/CSV/XLSX), matches each question to your approved an...
Adnan Tariq
⋅4 months ago⋅$49
Showing 30 out of 138 templates
Become a creator
Submit your template to the n8n template library, get featured, and earn via our affiliates program.