Top 174 SecOps automation workflows

Results (174)

Sort: Relevancy

Create Executive Security Briefings with NixGuard AI & Wazuh Alerts

Created by: Jonathan | NEX || nex
Jonathan | NEX

8 months agoFree

Drowning in security alerts? Spending hours translating technical logs from Wazuh, your SIEM, or other tools into business-friendly reports for leadership? This n8n workflow is your automated Security Analyst, designed to save you time and bridge the communication gap between technical teams and non-technical executives. Using a p...

Intelligent AI Digest for Security, Privacy, and Compliance Feeds

Created by: Niranjan G || niranjan
Niranjan G

9 months agoFree

How it works This workflow acts like your own personal AI assistant, automatically fetching and summarizing the most relevant Security, Privacy, and Compliance news from curated RSS feeds. It processes only the latest articles (past 24 hours), organizes them by category, summarizes key insights using AI, and delivers a clean HTML d...
  • +1

Comprehensive SSL Certificate Monitoring with Discord Alerts and Notion Integration

Created by: Tom Cao || tomcao
Tom Cao

8 months agoFree

🔐 Advanced SSL Health Monitor 👤 Who is this for? This workflow is designed for DevOps engineers, IT administrators, and security professionals who need comprehensive SSL certificate monitoring and health assessment across multiple domains — featuring dual verification and professional reporting without relying on expensive monit...
  • +1

Automated URL Phishing & Threat Analysis with NixGuard AI

Created by: Jonathan | NEX || nex
Jonathan | NEX

8 months agoFree

Stop manually checking suspicious links. This free n8n workflow provides the foundation for a powerful, automated URL analysis pipeline. Using the NixGuard AI engine, you can instantly analyze suspicious URLs from emails, logs, or tickets to uncover phishing attempts, malware hosting sites, and malicious redirects. What You Will A...

Automate Security Alert Triage with NixGuard AI and Route to Slack or Jira

Created by: Jonathan | NEX || nex
Jonathan | NEX

8 months agoFree

Are you drowning in a sea of security notifications? Do your analysts spend more time sifting through low-level logs than investigating real threats? This workflow transforms n8n into an autonomous SOC (Security Operations Center) Analyst, tackling alert fatigue head-on. Leveraging the NixGuard Security RAG connector, this workflo...

Website Scam Risk Detector with GPT-4o and SerpAPI

Created by: AiAgent || lifehacks
AiAgent

8 months agoFree

What It Does This intelligent workflow simplifies the complex task of determining whether a website is legitimate or potentially a scam. By simply submitting a URL through a form, the system initiates a multi-agent evaluation process. Four dedicated AI agents—each powered by GPT-4o and connected to SerpAPI—analyze different dimensi...

WebSecScan: AI-Powered Website Security Auditor

Created by: Dale Dunlop || daledunlop
Dale Dunlop

a year agoFree

WebSecScan: AI-Powered Website Security Auditor This n8n workflow provides comprehensive website security analysis by leveraging OpenAI's models to detect vulnerabilities, configuration issues, and security misconfigurations. The workflow generates a professional HTML security report delivered directly via Gmail. Key Features Du...
  • +2

Subdomain Enumeration with Subfinder, HTTPX & GPT-4-Mini for Security Reconnaissance

Created by: Javier Rieiro || pyus3r
Javier Rieiro

5 months agoFree

Generates a wordlist of 1,000–15,000 subdomains created by an AI agent by correlating detected technologies and recurring patterns. Objective Assist security researchers, bug bounty hunters, and web pentesters in the reconnaissance phase by incorporating an AI agent that generates additional potential subdomains. This enables disco...

Automate Free IP Analysis: NixGuard AI Summaries & Wazuh Integration

Created by: Jonathan | NEX || nex
Jonathan | NEX

8 months agoFree

Supercharge Your Security Operations for Free Stop wasting time manually investigating suspicious IP addresses. This workflow template is your launchpad to automating real-time IP cybersecurity analysis using the NixGuard platform, which you can use for free. This is the first of a two-part system designed to integrate seamlessly...

AI Privacy-Minded Router: PII Detection for Privacy, Security, & Compliance

Created by: Charles || codetender
Charles

8 months agoFree

Modern AI systems are powerful but pose privacy risks when handling sensitive data. Organizations need AI capabilities while ensuring: ✅ Sensitive data never leaves secure environments ✅ Compliance with regulations (GDPR, HIPAA, PCI, SOX) ✅ Real-time decision making about data sensitivity ✅ Comprehensive audit trails for regulat...
  • +2

Monitor Software Compliance with Jamf Patch Summaries in Slack

Created by: Jean-Marie Rizkallah  || mrrobot
Jean-Marie Rizkallah

8 months agoFree

🧩 Jamf Patch Summary to Slack Stay on top of software patch compliance by automatically posting Jamf patch summaries to Slack. This helps IT and security teams quickly identify outdated installs and take action—without logging into Jamf. ✅ Prerequisites • A Jamf Pro API key with permissions to read software titles and patch summa...

AI-Powered Vendor Policy & RSS Feed Analysis with Integrated Risk Scoring

Created by: Kamalraj || kamalraj
Kamalraj

8 months agoFree

🧠 Overview A dual-engine, AI-driven n8n workflow that automates the monitoring of both vendor policy webpages and compliance-related RSS feeds. It intelligently detects recent updates, evaluates their potential risk, and delivers a structured HTML digest categorized by severity — right to your inbox. ⚙️ How It Works 1️⃣ Schedul...
  • +2

SSL Certificate Expiry Notifier (No Paid APIs)

Created by: Evoort Solutions || evoortsolutions
Evoort Solutions

9 months agoFree

Great — here’s a complete Workflow Description for your n8n Creator submission based on the JSON you shared: 🔒 SSL Expiry Notifier (No Paid APIs) 🧩 How it Works This workflow automatically checks SSL certificate expiry dates for a list of websites and sends timely email alerts if any certificate is close to expiring. It’s idea...

Secure User Emails with AES-256 Encryption and Verification System

Created by: David Olusola || dae221
David Olusola

8 months ago$8

🔐 Email Encryption Masterclass Professional-Grade AES-256 Data Protection for n8n How It Works This comprehensive workflow demonstrates enterprise-level email encryption using industry-standard AES-256-CBC encryption. Perfect for organizations handling sensitive customer data who need to comply with GDPR, HIPAA, or other data pr...

Automated SSL Certificate Monitoring and Renewal with Notion and Telegram

Created by: Frank Chen || frankchen
Frank Chen

9 months agoFree

Automatically fetch existing domains from Notion's Database and verify the validity of SSL certificates through SSL-Checker. If the validity period is less than 14 days, send a Telegram message notification and trigger SSH remote automatic refresh. Successful refresh notification will be sent through Telegram. This can prevent prob...
  • +1

Network Vulnerability Scanner with NMAP and Automated CVE Reporting

Created by: Vigh Sandor || vighsandor
Vigh Sandor

4 months agoFree

Network Vulnerability Scanner (used NMAP as engine) with Automated CVE Report Workflow Overview This n8n workflow provides comprehensive network vulnerability scanning with automated CVE enrichment and professional report generation. It performs Nmap scans, queries the National Vulnerability Database (NVD) for CVE information, ge...

Track CVE Vulnerability Details & History with NVD API and Google Sheets

Created by: Niranjan G || niranjan
Niranjan G

9 months agoFree

Who is this for? NVD (National Vulnerability Database) data is essential for security analysts, vulnerability managers, and DevSecOps professionals who need to perform both CVE lookups and monitor historical change logs. This workflow helps streamline those efforts by providing structured outputs for audit, triage, or compliance t...

Get Real-Time Security Insights with NixGuard RAG and Wazuh Integration

Created by: Jonathan | NEX || nex
Jonathan | NEX

9 months agoFree

Effortlessly integrate NixGuard API into your n8n workflows for real-time security insights using your API key. This connector enables seamless interaction with Nix, providing rapid Retrieval-Augmented Generation (RAG) event knowledge with Wazuh integration - completely free and set up in under 5 minutes! 🚀 Features: ✅ Query NixG...

Web Security Scanner for OWASP Compliance with Markdown Reports

Created by: Sean Birmingham || knute
Sean Birmingham

4 months agoFree

How the n8n OWASP Scanner Works & How to Set It Up How It Works (Simple Flow): Input**: Enter target URL + endpoint (e.g., https://example.com, /login) Scan**: This workflow executes 5 parallel HTTP tests (Headers, Cookies, CORS, HTTPS, Methods) Analyze**: Pure JS logic checks OWASP ASVS (Application Security Verification Standard...

Automated GitHub Scanner for Exposed AWS IAM Keys

Created by: Niranjan G || niranjan
Niranjan G

9 months agoFree

Automated GitHub Scanner for Exposed AWS IAM Keys Overview This n8n workflow automatically scans GitHub for exposed AWS IAM access keys associated with your AWS account, helping security teams quickly identify and respond to potential security breaches. When compromised keys are found, the workflow generates detailed security rep...

Monitor GitHub repo access and push events with GitHub and Slack alerts

Created by: RamS || rams1005
RamS

2 months agoFree

Monitor GitHub Repositories for Unauthorized Actions How it works: This workflow monitors GitHub for high-risk activities to ensure that only authorized users can modify the repository. It periodically polls GitHub for events such as PushEvent, MemberEvent, and PublicEvent. For each event, the workflow extracts the username of ...

Discord Server Anti-Impersonation / Scammer Tracker with Data Tables

Created by: Cj Elijah Garay || elijahbuilds-ai
Cj Elijah Garay

3 months ago$25

Discord Member Change Tracker This n8n template demonstrates how to automatically monitor and track username and nickname changes across your Discord server members. Perfect for community moderation, security monitoring, and maintaining accountability in large servers! Use cases are many Try tracking suspicious account behavior,...

Automated AWS IAM Key Compromise Response with Slack & Claude AI

Created by: Niranjan G || niranjan
Niranjan G

8 months agoFree

🛡️ Automated AWS Key Compromise Remediation Description This n8n workflow provides a secure, enterprise-grade response system for AWS IAM access key compromises with built-in form submission and human approval mechanisms. When an AWS access key is suspected to be compromised, this workflow enables rapid containment through a sec...
  • +3

Automated Lead Generation & Qualification with Google Maps, GPT-4 & HubSpot

Created by: David Olusola || dae221
David Olusola

9 months ago$49

This n8n workflow automates CVE tracking by retrieving vulnerability details from the NVD API 🛡️, organizing and updating the data in Google Sheets 📊, and optionally alerting teams via Slack or Email 📩💬. Who is this for? This workflow is ideal for: Security operations (SecOps) teams 🧑‍💻 DevSecOps engineers 🛠️ IT complianc...
  • +3

Monitor Data Breaches in Real-time with Have I Been Pwned

Created by: Audun || xqus
Audun

a year agoFree

Who is this for? Security professionals Developers Individuals interested in data breach awareness Use Case Automated monitoring for new breaches Proactive identity protection Demonstration of simple cache mechanism What this workflow does Checks the Have I Been Pwned API every 15 minutes for the latest breaches. Compares new br...

Automate SIEM Alert Enrichment with MITRE ATT&CK, Qdrant & Zendesk in n8n

Created by: Angel Menendez || djangelic
Angel Menendez

a year agoFree

n8n Workflow: Automate SIEM Alert Enrichment with MITRE ATT&CK & Qdrant Who is this for? This workflow is ideal for: Cybersecurity teams & SOC analysts* who want to automate SIEM alert enrichment*. IT security professionals* looking to integrate MITRE ATT&CK intelligence* into their ticketing system. Organizations using ...
  • +7

Auto CVE & IOC Feed Ingestor with OpenAI Risk Triage & Email Alerts

Created by: Adnan Tariq || adnantariq
Adnan Tariq

7 months ago$29

How it works This Blue Team workflow ingests threat intelligence from public CVE and IOC feeds, merges the data, performs automated triage using OpenAI, and routes actionable alerts via email. 📥 CVE and IOC feeds pulled from trusted sources 🤖 AI node evaluates risk severity and recommends response 🧠 Playbook logic determi...
  • +1

🛠️ TheHive Tool MCP Server

Created by: David Ashby || cfomodz
David Ashby

8 months ago$15

Need help? Want access to this workflow + many more paid workflows + live Q&A sessions with a top verified n8n creator? Join the community Complete MCP server exposing all TheHive Tool operations to AI agents. Zero configuration needed - all 4 operations pre-built. ⚡ Quick Setup Import this workflow into your n8n instance Activ...

SSL Expiry Alert with SSL-Checker.io

Created by: Vishal Kumar || vishalquantana
Vishal Kumar

a year agoFree

Use Case Managing SSL certificates manually can be time-consuming and error-prone, often leading to unexpected downtime or security risks due to expired certificates. What This Workflow Does This workflow automatically monitors SSL certificates for a list of websites, checks their expiry status using SSL-Checker.io, and sends t...

Enrich IP addresses with country attribution using IPinfo and Slack alerts

Created by: Edson Encinas || eedson
Edson Encinas

a month agoFree

🧩 Template Description IP Enrichment & Country Attribution is a lightweight cybersecurity automation that enriches IP addresses with geographic and network intelligence. It validates incoming IPs, filters out private or invalid addresses, and enriches public IPs using an open-source IP enrichment service. 🔄 How It Works Receive...

Showing 30 out of 174 templates

Need inspiration? What’s in your stack?

FAQs

FAQs about SecOps automation workflows

What is SecOps automation?

What are some examples of SecOps workflows in n8n?

Can n8n integrate with my existing SecOps tools?

How do I get started with SecOps automation using n8n?

How secure are the workflows created in n8n?

How does n8n’s pricing model benefit me when automating SecOps workflows?