Back to Catalog
Adnan Tariq

Adnan Tariq

Founder of CYBERPULSE AI — helping security teams and SMEs eliminate repetitive tasks through modular n8n automations. I build workflows for vulnerability triage, compliance reporting, threat intel, and Red/Blue/GRC ops. Book a session if you'd like custom automation for your use case. https://linkedin.com/in/adnan-tariq-4b2a1a47

Total Views3,458
Templates17

Templates by Adnan Tariq

AI-powered vulnerability scanner with Nessus, risk triage & Google Sheets reporting

🛡 CyberScan – AI-Powered Vulnerability Scanner with Nessus, OpenAI, and Google Sheets 👤 Who’s it for Security teams, DevOps engineers, vulnerability analysts, and automation builders who want to eliminate repetitive Nessus scan parsing, AI-based risk triage, and manual reporting. Designed for orgs following NIST CSF or CISA KEV compliance guidelines. --- ⚙️ How it works / What it does Runs scheduled or manual scans via the Nessus API. Processes scan results and extracts asset + vulnerability data. Uses a custom AI-based risk metric (LEV) to triage findings into: 🚨 Expert review ✅ Self-healing 🕵️ Monitoring Automatically sends email alerts for critical CVEs. Exports daily summaries to Google Sheets (or your own BI system). Maps to NIST CSF (Identify, Protect, Detect, Respond, Recover). --- 🧰 How to set up Nessus: Add your Nessus API credentials and instance URL. Google Sheets: Authenticate your Google account. OpenAI / LLM: Use your API key if adding LLM triage or rewrite prompts. Email: Update SMTP credentials and alert recipient address. Set your targets: Adjust asset ranges or scan UUIDs as needed. ⚠️ All setup steps are explained in sticky notes inside the workflow. --- 📋 Requirements Nessus Essentials (Free) or Nessus Pro with API access. SMTP service (e.g. Gmail, Mailgun, SendGrid). Google Sheets OAuth2 credentials. Optional: OpenAI or other LLM provider for LEV scoring and CVE insights. --- 🛠 How to customize the workflow Swap Google Sheets with Airtable, Supabase, or PostgreSQL. Change scan logic or asset list to fit your internal network scope. Adjust AI scoring logic to match internal CVSS thresholds or KEV tags. Expand alerting logic to include Slack, Discord, or webhook triggers. --- 🔒 No sensitive data included. All credentials and sheet links are placeholders.

Adnan TariqBy Adnan Tariq
1738

Automated DNS records lookup for subdomains with HackerTarget API reports

🧠 EnumX: Auto DNS Lookup for Subdomains with Markdown Export Who’s it for Security engineers, red teamers, or automation-curious teams looking to enhance passive reconnaissance with minimal effort. Ideal for early-stage security setups, bug bounty hunters, and SME SOC analysts. What it does This workflow performs passive subdomain enumeration and DNS record lookup for a given domain. It parses the data, generates a clean markdown report, and sends it via email. 🌐 Uses HackerTarget APIs for subdomain and DNS data 🧠 Parses records (A, AAAA, CNAME, TXT, MX, NS, SOA) 📨 Sends a structured markdown report to a designated inbox 🛡️ Useful for recon, misconfiguration detection, and compliance evidence How to set up Replace the email address in the Gmail node with your recipient. (Optional) Replace HackerTarget API with your own recon APIs. Click Execute Workflow or trigger via cron on schedule. View the full markdown output in your inbox. Requirements Free Gmail account (with n8n Gmail OAuth2 configured) (Optional) Replace example.com with your target domain Internet access (API calls use HTTPS) How to customize the workflow Modify the target domain via the "🌐 Target Domain" Set node Adjust markdown format in “📝 Format DNS Markdown” Replace Gmail node with Slack/Telegram/Notion if preferred Add additional enrichment nodes (e.g., Shodan, VirusTotal) for deeper analysis *💼 This template is part of the CYBERPULSE AI BlueOps/RedOps suite.

Adnan TariqBy Adnan Tariq
302

Cyberpulse AI GRC: Automate security questionnaire responses

Description Automates vendor/customer security questionnaire responses. It ingests a questionnaire (Sheet/CSV/XLSX), matches each question to your approved answers and evidence, and writes a clean “Auto-Fill” sheet ready to review and send back. Optional alerts nudge reviewers and track progress to completion. Who’s It For GRC / Compliance teams responding to customer security reviews Security engineers and sales engineers supporting questionnaires Startups that need fast, consistent, audit-ready answers How It Works Trigger Run manually, on a schedule, or when a questionnaire file/row is added. Ingest & Normalize Reads questions from Google Sheets/CSV/XLSX. Normalizes columns (e.g., question, category, customer_notes) and de-duplicates. Classify Detects question type (Yes/No, multi-select, free text). Tags topics (encryption, access control, incident response, privacy, HR, etc.). Answer Retrieval Looks up approved answers from your Answer Library sheet (mapped by keywords/category/control). Falls back to templates (short form/long form) when no exact match exists. Evidence Linking Inserts Drive links for policies, diagrams, SOC2/ISO docs (from your evidence folder). Adds version/date so reviewers can verify what was sent. Auto-Fill Output Writes a new sheet with columns like: question, proposedanswer, rationale/notes, evidencelink, controlref, owner, status, confidence, lastupdated. Review & Notifications Emails the reviewer/owner with a link to the output sheet for quick approval edits. Status can move from draft → reviewed → ready to send. Export Optional export to CSV/XLSX to match customer’s template. Optional PDF of responses for audit trail. Requirements Google Sheets & Drive credentials Destination Sheet & Evidence folder (env vars used in the template): GSHEETID, GSHEETSHEET DRIVEFOLDERID (or keep SANITIZED and set after import) Alert email: GRCALERTEMAIL File Templates GRCSQAutoFill_Template.xlsx – target sheet with the output columns above Answer_Library.xlsx / Sheet tab – key-value pairs: keywords/category → approved answers Control_Mapping.xlsx / Sheet tab – optional mapping to ISO 27001, SOC2, NIST CSF Output A populated Auto-Fill sheet ready to review/share Evidence links with versioning Email notification to the reviewer with next steps Customization Tips Add your framework tags (ISO/SOC2/NIST) to enable quick mapping in the output. Set owners per topic (e.g., “Encryption → Security Eng”, “Privacy → Legal”). Add a confidence score threshold to flag answers needing human review. Enable “strict mode” to prevent sending answers without evidence links. Schedule a weekly run to pre-fill common questionnaires and keep answers fresh.

Adnan TariqBy Adnan Tariq
145

CYBERPULSE AI RedOps: internal phishing simulation for security training

Description: Simulate phishing awareness campaigns using OpenAI-generated emails. Send to target lists, log clicks with a webhook, and store results in Google Sheets. Built for internal testing and cyber awareness training. Who’s it for: Security teams conducting internal simulations GRC teams doing phishing awareness Red Teams wanting modular test setups How it works / What it does: Loads targets from Google Sheets Uses OpenAI to write realistic phishing emails Sends them via Gmail Tracks who clicked via webhook Logs actions in Sheets Requirements: Gmail or SMTP credentials Google Sheets OAuth2 OpenAI API Key Self-hosted webhook or tunnel for /phishlink tracking How to customize: Replace email template with your own LLM prompt Swap Gmail for SendGrid, SES, etc. Edit domain in tracking link Use Cron or manual start

Adnan TariqBy Adnan Tariq
113

Auto-classify security incidents with GPT-4 and Google Sheets for SOC teams

👤 Who it’s for Blue Team leads, SOC analysts, and IT responders looking to automatically classify security alerts using AI-driven logic and asset-based risk signals. Ideal for teams already scoring threats via CyberScan or BlueOps Module 3, and needing to prioritize next steps across Monitor / Investigate / Isolate / Escalate playbooks. ⚙️ How it works / What it does Reads recent endpoint alerts from Google Sheets Sends alert data (hostname, IP, risk score) to OpenAI GPT model GPT returns structured JSON with: severity tag (Low / Medium / High / Critical) action recommendation (Monitor / Investigate / Isolate / Escalate) Logs the full result to a centralized incident sheet Can be expanded to trigger automated EDR actions or email alerts 🛠️ How to set up Insert OpenAI API Key Replace placeholder with your actual OpenAI secret in the HTTP Request node Connect Sheets Use your OAuth2 credentials to access the alerts input + classified log sheet Tune GPT Prompt Adjust language or risk thresholds inside the 🧠 Classify Incident (GPT) node Automation Add a Cron node or Webhook to run every X minutes/hours 📋 Requirements OpenAI API key (GPT-4 or GPT-3.5 supported) Google Sheets (or similar DB with alerts) n8n credentials for Sheets access Optional: Connected playbook actions or EDR endpoint logic 🧩 How to customize the workflow Swap GPT with Claude, Gemini, or local LLM via API Replace Google Sheets with Supabase or Airtable Add a playbook router for Notify / Isolate logic Integrate email or ticketing notification step 📦 This is a production-grade, AI-powered classification engine. All inputs and tags are configurable. Safe placeholders are marked clearly. 📘 This module is part of the CYBERPULSEBlueOps Pro automation suite. Explore the full set at 👉 cyberpulsesolutions.com/blueops

Adnan TariqBy Adnan Tariq
107

CYBERPULSE AI GRC: automate PCI DSS control evaluation and compliance tracking

Description Automatically evaluates PCI DSS control responses using logic or AI. Designed to speed up compliance workflows, reduce audit fatigue, and flag non-compliance early. Who’s It For: Internal compliance teams PCI DSS auditors Security officers preparing for certification How It Works: Reads PCI controls and responses from Google Sheet Applies logic to classify each control as Compliant, Partial, or Non-Compliant Tags evaluation results Sends output to Sheet, Email, or Drive Requirements: Google Sheet with PCI controls n8n (open-source automation tool) Optional: Gmail or Drive node for delivery Google Sheet Requirements: Columns: ControlID, ControlDescription, Response, Evaluation_Result, Notes Headers must be in row 1 File Templates: PCIControlEvaluation_Template.xlsx Customization Tips: Adjust logic for more strict evaluation Highlight non-compliant results for rapid review Compliance Alignment: • PCI DSS v4.0 • ISO 27001 – Annex A crosswalk • Internal audit programs Setup Instructions: Fill in the Google Sheet template Connect to n8n with Google Sheet node Run the workflow or schedule via Cron node Review and export results 🌐 https://cyberpulsesolutions.com 📧 info@cyberpulsesolutions.com

Adnan TariqBy Adnan Tariq
107

CYBERPULSE AI GRC: automate compliance audit documentation

Description Automatically packages audit-ready evidence files matched to control IDs from ISO 42001 or other frameworks. Fetches logs from Google Sheets, finds corresponding files in Google Drive, compresses them into a ZIP archive, and sends via email — no manual formatting required. Who’s It For: Compliance teams preparing audit documentation GRC consultants managing multiple clients Internal auditors requiring traceable evidence How It Works: Trigger manually or on schedule (e.g., daily) Reads audit logs from Google Sheets Searches Google Drive for files matching control_id Downloads matched files Zips them into an archive Sends the archive via email (Gmail or SMTP) Requirements: Gmail or SMTP node for email delivery Google Sheets connected (OAuth2) Google Drive connected (OAuth2) Google Sheet Requirements: Columns: controlid, description, evidencestatus, last_updated One row per control ID or log entry Headers must be in the first row Log sheet must be shared with your service account or n8n-connected user File Templates: AuditAutoPackSheet_Template.xlsx Evidence files in Google Drive named using control ID (e.g., ISO42001-5.1.pdf) Customization Tips: Adjust ZIP archive name in the “Zip Files” node Customize email subject, body, and recipient Use a different Drive folder per client or audit phase Ethics & Compliance: Ensures audit trail and evidence traceability Prevents unauthorized edits or file mismatches Setup Instructions Copy the provided Google Sheet template (linked in File Templates). Fill in your audit logs (columns: controlid, description, status, lastupdated). Connect Google Sheets node using OAuth credentials. In the Gmail node: Set recipient email (e.g., your_email@example.com) Choose “Send binary data” and attach ZIP Trigger via Cron node (e.g., daily) or manually (Optional) Connect Drive or S3 node to store a backup copy Supports: ISO 42001 AI Governance PCI DSS v4.0 NIST CSF / SOCI Act ACSC Essential Eight https://cyberpulsesolutions.com

Adnan TariqBy Adnan Tariq
103

Automate security incident response with Google Sheets, email alerts and EDR isolation

👤 Who it’s for SOC teams, incident responders, or solo defenders who need to automatically act on critical threats without manual triage. Ideal for BlueOps users who’ve already classified alerts via GPT (Module 4) and want to auto-execute response steps like email alerts, logging, or EDR isolation. ⚙️ How it works / What it does Reads critical alerts from a classified incident log (e.g., Module 4 output) Filters alerts by severity = Critical Sends alert summary via email (custom HTML formatting) Logs all details to a central incident response sheet Optionally sends a request to your EDR/Isolation API (e.g. CrowdStrike or simulated API) 🛠️ How to set up Replace Placeholder API Key Swap in your secure ISOLATIONAPIKEY from your EDR or proxy tool Update Email Settings Insert your FROMEMAIL and TOEMAIL credentials in the Email node Connect Sheets Authorize access to both your Classified Alerts sheet and Incident Log sheet Schedule the Run Default trigger is weekly — change it to run hourly, on webhook, or via logic hook 📋 Requirements EDR or endpoint proxy API accepting POST requests Open or pre-classified incident sheet (Module 4 required) SMTP email provider or Gmail API access Google Sheets or internal DB to log actions 🧩 How to customize the workflow Replace Google Sheets with Supabase or your internal SQL Swap email alerts with ticketing system (e.g., Jira or Slack alerts) Trigger downstream actions (e.g. auto-pause cloud assets) Modify aggregation or isolation logic to your threat model 📦 This is a live-fire auto-responder workflow. Make sure to test with dummy data before enabling full EDR triggers. All sensitive variables are clearly marked with placeholders. 🚨 This module is part of the CYBERPULSEBlueOps Pro Incident Response Suite. View the full lineup at 👉 cyberpulsesolutions.com/blueops

Adnan TariqBy Adnan Tariq
85

CYBERPULSE AI redOps: phishing simulation with redirect tracking

Description: Simulate cloaked phishing links that redirect through a controlled proxy. This module tracks if secure email gateways (SEGs) or sandboxes trigger the redirect before users do. Logs access, response, and timestamps in Google Sheets. Who’s It For: Red Teams simulating real-world phishing redirects Security teams testing gateway/sandbox behavior Awareness teams tracking click-throughs How It Works: Loads target list from Google Sheets Generates dynamic redirect links per target Emails the links using Gmail or SMTP Simulates access via webhook or internal call Logs metadata and redirect access to Sheets Requirements: Google Sheet Requirements Sheet Name: Redirect_Logs Required Columns: name, team, email, module, status, payload, response, timestamp Google Sheets credentials Email service (Gmail, SMTP, or custom node) Optional: Real endpoint for link redirection (e.g., Vercel Function, Cloudflare Worker) Setup Instructions Clone or copy the provided Google Sheet template (linked below). Set up the webhook trigger in the Redirect Proxy node. Use URL shortener node (optional) to obfuscate redirect links. Connect Google Sheets node and map fields: timestamp, IP, user-agent, original URL. Configure redirection logic using IF and Set nodes. Run a test redirect to validate Google Sheet logging. File Templates: RedOpsRedirectCloakLog_Template.xlsx email name team payload response status module timestamp test@org.com John Doe IT redirect.link/... Redirect triggered Simulated RedirectCloak 2025-07-27T12:00:00Z Customization Redirect Logic: Modify the HTTP Response or Set node to redirect to real servers or simulation targets. Tracking Format: Adjust the structure of the logged data — include fields like user-agent, referrer, campaign ID, etc. Redirection Endpoint: Host the redirection logic on a public API gateway (e.g., AWS API Gateway, Vercel Edge Function) if deploying outside of n8n. Obfuscation: Integrate a URL shortener (like Bitly) or a custom domain to hide the true destination during simulations. Ethics Note: This module is intended for internal simulations only and does not contain malicious payloads. Always use with authorization and red team awareness protocols. 🔗 Part of the CYBERPULSE AI RedOps Suite 🌐 https://cyberpulsesolutions.com 📧 info@cyberpulsesolutions.com

Adnan TariqBy Adnan Tariq
80

CYBERPULSE AI GRC: automated ISO 42001 compliance evaluation

Description Automatically evaluates and maps AI governance responses to ISO 42001:2023 clause requirements using AI-powered logic. Designed for GRC consultants, audit teams, and AI-focused security programs to reduce time spent on manual clause interpretation and alignment. Who’s It For: GRC Consultants handling AI governance controls Internal Auditors preparing for ISO 42001 audits Security teams implementing AI assurance frameworks Organizations adopting Responsible AI principles How It Works: Triggers manually or on schedule (e.g., clause review cycles) Reads AI control responses from a connected Google Sheet Uses AI to evaluate each response against ISO 42001 clauses Flags compliance status (match / partial / gap) with clause mapping Outputs a clean control map with automated summary Requirements: Gmail or SMTP node for email Google Sheets connected (OAuth) OpenAI or AI node (optional but recommended for advanced clause interpretation) Google Sheet Requirements: Columns: ClauseID, ClauseDescription, ControlResponse, Evaluation_Result Each row must correspond to one ISO 42001 clause Headers in the first row Optional: add column for Suggested_Remediation File Templates: ISO42001MappingTemplate.xlsx Includes: clause ID, clause text, response, result, suggested fix Customization Tips: Modify clause response logic in the evaluation node (e.g., strict vs lenient mapping) Enable multi-framework mapping (e.g., align to NIST AI RMF as well) Auto-send mapping result to Drive or S3 as audit evidence Ethics & Compliance: This module assists with clause interpretation and reporting only. It does not simulate AI models or assess ethical risk directly. For internal reporting, policy alignment, and audit preparation use only. Setup Instructions: Copy the provided Google Sheet template (ISO42001MappingTemplate.xlsx) Fill in your control responses (row = clause) Connect Google Sheets node using OAuth credentials In the AI node: Evaluate clause response using GPT or internal prompt Flag match/partial/gap Optional: auto-send report via email or upload to storage Review results and update your compliance register accordingly Supports: ISO 42001:2023 AI Governance Principles (OECD, NIST AI RMF) SOCI Act compliance efforts (AI assurance layer) ACSC AI oversight recommendations 📬 info@cyberpulsesolutions.com 🌐 https://www.cyberpulsesolutions.com/

Adnan TariqBy Adnan Tariq
76

CYBERPULSE AI redOps: credential trap sim: fake login page simulation

📝 Description: Simulate a phishing login page to test user behavior and SOC response. This controlled workflow sends trap links to predefined targets and logs simulated interaction results—without capturing real credentials. ✅ Who’s It For: Red Teams conducting phishing awareness campaigns SOCs validating alert triggers for credential-based phishing GRC/Compliance teams performing control testing ⚙️ How It Works: Loads test targets from Google Sheets Generates trap page URLs (non-malicious) Fakes login interaction upon click Logs timestamped event and status to Google Sheet 📦 Requirements: Google Sheets credentials Optional: Use Vercel/Cloudflare to deploy a real HTML page for advanced simulation No sensitive data is collected 📁 File Templates: RedOpsCredentialTrapSimLog_Template.xlsx email name team payload response status module timestamp jane@org.com Jane Doe HR fake-login.com User clicked Simulated CredentialTrapSim 2025-07-27T11:00:00Z 🧠 Customization Tips: Change trap content using a public static site Connect to real EDR/alert system for end-to-end SOC validation Adjust payload wording for different awareness campaigns ⚠️ Ethics & Warning: This module is 100% simulated and does not capture real credentials. Use only in authorized environments with informed consent. It is designed for training, awareness, and control testing under ethical guidelines. 🔗 Part of the CYBERPULSE AI RedOps Suite 🌐 https://cyberpulsesolutions.com 📧 info@cyberpulsesolutions.com

Adnan TariqBy Adnan Tariq
73

Aggregate endpoint security risk scores with EDR, vulnerability data & Google Sheets

👤 Who it’s for Security teams, SOC analysts, and small-to-mid IT teams looking to automatically assess endpoint risk by combining known vulnerabilities with internal asset value and dynamic threat indicators. Perfect for teams using Google Sheets or CSV asset inventories who want to prioritize incidents based on true business risk — not just raw CVE scores. ⚙️ How it works / What it does Fetches endpoint-specific CVE data from prior modules or external feeds Loads enriched internal asset inventory (IP, department, criticality, etc.) Calculates risk score using a weighted formula: (CVE severity × Asset risk rating × Exposure coefficient) Applies custom playbook rules to determine action level (Notify / Investigate / Isolate) Outputs filtered, triaged list of high-risk endpoints Logs results to active and historical threat sheets Sends summary email alerts based on final triaged list 🛠️ How to set up Google Sheets: Connect your enriched asset inventory and endpoint vulnerability input sheets using your OAuth2 credentials Edit Thresholds: Adjust scoring logic or thresholds in the “🔎 Risk Score Calculator” node Email Alerts: Add your sender credentials and customize recipient address list Automation Trigger: Optional: Add a Cron node or Webhook to run this aggregator hourly/daily Review sticky notes: All logic is labeled clearly with setup instructions 📋 Requirements Google account + access to n8n Google Sheets integration Vulnerability scan output (from CyberScan or external CVE feed) Enriched asset inventory with basic scoring fields (asset value, criticality) SMTP or email alert service (optional) 🧩 How to customize the workflow Replace Google Sheets with Supabase, Airtable, or internal DB Add columns for department ownership, system type, or live agent signals Integrate with EDR/XDR system or incident tracking tool Expand the playbook to include automatic isolation triggers 📦 This is a clean, production-ready version with no sensitive data. Placeholders are clearly marked. 🔐 This module is part of the CYBERPULSEBlueOps Pro Pack. Get access to advanced automation, isolation triggers, full asset triage logic, and instant download at 👉 cyberpulsesolutions.com/blueops

Adnan TariqBy Adnan Tariq
64