Results (152)
Drowning in security alerts? Spending hours translating technical logs from Wazuh, your SIEM, or other tools into business-friendly reports for leadership? This...
Jonathan | NEX
⋅6 months ago⋅Free
How It Works This workflow automates financial transaction surveillance by monitoring multiple payment systems, analyzing transaction patterns with AI, and trig...
Cheng Siong Chin
⋅3 days ago⋅Free
How it works This workflow acts like your own personal AI assistant, automatically fetching and summarizing the most relevant Security, Privacy, and Compliance ...
Niranjan G
⋅7 months ago⋅Free
🔐 Advanced SSL Health Monitor 👤 Who is this for? This workflow is designed for DevOps engineers, IT administrators, and security professionals who need compr...
Tom Cao
⋅6 months ago⋅Free
Stop manually checking suspicious links. This free n8n workflow provides the foundation for a powerful, automated URL analysis pipeline. Using the NixGuard AI e...
Jonathan | NEX
⋅6 months ago⋅Free
Are you drowning in a sea of security notifications? Do your analysts spend more time sifting through low-level logs than investigating real threats? This workf...
Jonathan | NEX
⋅6 months ago⋅Free
What It Does This intelligent workflow simplifies the complex task of determining whether a website is legitimate or potentially a scam. By simply submitting a ...
AiAgent
⋅7 months ago⋅Free
WebSecScan: AI-Powered Website Security Auditor This n8n workflow provides comprehensive website security analysis by leveraging OpenAI's models to detect vuln...
Dale Dunlop
⋅10 months ago⋅Free
Generates a wordlist of 1,000–15,000 subdomains created by an AI agent by correlating detected technologies and recurring patterns. Objective Assist security re...
Javier Rieiro
⋅3 months ago⋅Free
Supercharge Your Security Operations for Free Stop wasting time manually investigating suspicious IP addresses. This workflow template is your launchpad to aut...
Jonathan | NEX
⋅6 months ago⋅Free
Modern AI systems are powerful but pose privacy risks when handling sensitive data. Organizations need AI capabilities while ensuring: ✅ Sensitive data never...
Charles
⋅6 months ago⋅Free
🧩 Jamf Patch Summary to Slack Stay on top of software patch compliance by automatically posting Jamf patch summaries to Slack. This helps IT and security teams...
Jean-Marie Rizkallah
⋅7 months ago⋅Free
🧠 Overview A dual-engine, AI-driven n8n workflow that automates the monitoring of both vendor policy webpages and compliance-related RSS feeds. It intelligent...
Kamalraj
⋅7 months ago⋅Free
Great — here’s a complete Workflow Description for your n8n Creator submission based on the JSON you shared: 🔒 SSL Expiry Notifier (No Paid APIs) 🧩 How it W...
Evoort Solutions
⋅7 months ago⋅Free
🔐 Email Encryption Masterclass Professional-Grade AES-256 Data Protection for n8n How It Works This comprehensive workflow demonstrates enterprise-level emai...
David Olusola
⋅6 months ago⋅$8
Automatically fetch existing domains from Notion's Database and verify the validity of SSL certificates through SSL-Checker. If the validity period is less than...
Frank Chen
⋅7 months ago⋅Free
Network Vulnerability Scanner (used NMAP as engine) with Automated CVE Report Workflow Overview This n8n workflow provides comprehensive network vulnerability...
Vigh Sandor
⋅2 months ago⋅Free
Who is this for? NVD (National Vulnerability Database) data is essential for security analysts, vulnerability managers, and DevSecOps professionals who need to...
Niranjan G
⋅7 months ago⋅Free
Effortlessly integrate NixGuard API into your n8n workflows for real-time security insights using your API key. This connector enables seamless interaction with...
Jonathan | NEX
⋅7 months ago⋅Free
How the n8n OWASP Scanner Works & How to Set It Up How It Works (Simple Flow): Input**: Enter target URL + endpoint (e.g., https://example.com, /login) Scan**:...
Sean Birmingham
⋅2 months ago⋅Free
Automated GitHub Scanner for Exposed AWS IAM Keys Overview This n8n workflow automatically scans GitHub for exposed AWS IAM access keys associated with your A...
Niranjan G
⋅7 months ago⋅Free
Discord Member Change Tracker This n8n template demonstrates how to automatically monitor and track username and nickname changes across your Discord server me...
Cj Elijah Garay
⋅a month ago⋅$25
🛡️ Automated AWS Key Compromise Remediation Description This n8n workflow provides a secure, enterprise-grade response system for AWS IAM access key compromi...
Niranjan G
⋅7 months ago⋅Free
This n8n workflow automates CVE tracking by retrieving vulnerability details from the NVD API 🛡️, organizing and updating the data in Google Sheets 📊, and opt...
David Olusola
⋅7 months ago⋅$49
Who is this for? Security professionals Developers Individuals interested in data breach awareness Use Case Automated monitoring for new breaches Proactive id...
Audun
⋅10 months ago⋅Free
n8n Workflow: Automate SIEM Alert Enrichment with MITRE ATT&CK & Qdrant Who is this for? This workflow is ideal for: Cybersecurity teams & SOC analysts* ...
Angel Menendez
⋅a year ago⋅Free
How it works This Blue Team workflow ingests threat intelligence from public CVE and IOC feeds, merges the data, performs automated triage using OpenAI, and r...
Adnan Tariq
⋅6 months ago⋅$29
Need help? Want access to this workflow + many more paid workflows + live Q&A sessions with a top verified n8n creator? Join the community Complete MCP server...
David Ashby
⋅7 months ago⋅$15
Use Case Managing SSL certificates manually can be time-consuming and error-prone, often leading to unexpected downtime or security risks due to expired certi...
Vishal Kumar
⋅a year ago⋅Free
Monitor GitHub Repositories for Unauthorized Actions How it works: This workflow monitors GitHub for high-risk activities to ensure that only authorized user...
RamS
⋅18 days ago⋅Free
Showing 30 out of 152 templates
Become a creator
Submit your template to the n8n template library, get featured, and earn via our affiliates program.