Search Results for "network traffic analyzer"

Showing 900 open source projects for "network traffic analyzer"

View related business solutions
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • The AI workplace management platform Icon
    The AI workplace management platform

    Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.

    By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
    Learn More
  • 1
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Discourse Network Analyzer (DNA)

    Discourse Network Analyzer (DNA)

    Discourse Network Analyzer (DNA)

    The Java software Discourse Network Analyzer (DNA) is a qualitative content analysis tool with network export facilities. You import text files and annotate statements that persons or organizations make, and the program will return network matrices of actors connected by shared concepts.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    MemProcFS Analyzer

    MemProcFS Analyzer

    Automated Forensic Analysis of Windows Memory Dumps for DFIR

    ...The Analyzer layer adds higher-level parsing and extraction routines—for example, carving strings, locating injected modules, enumerating handles, or reconstructing network sockets—so investigators can go from raw memory to actionable evidence more quickly. It emphasizes automation and reproducibility: parsers can be chained, results exported, and reports templated to fit incident workflows.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 4
    Sniffnet

    Sniffnet

    Application to comfortably monitor your Internet traffic

    Application to comfortably monitor your Internet traffic. Multithreaded, cross-platform, and reliable. Sniffnet is completely free, open-source software which needs lots of effort and time to develop and maintain. Save complete textual reports with detailed information for each network connections. Get details about domain names and network providers of the hosts you are exchanging traffic with.
    Downloads: 50 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 5
    Zapret Discord YouTube

    Zapret Discord YouTube

    Windows-based network traffic manipulation tool

    Zapret Discord YouTube is a Windows-based network traffic manipulation tool designed to bypass internet restrictions and throttling applied to services such as YouTube and Discord by modifying how traffic is handled at the packet level. The project is built on top of the broader “zapret” ecosystem and uses WinDivert, a low-level packet interception driver, to filter, split, and alter network packets in real time in order to evade deep packet inspection (DPI) systems used by ISPs or governments. ...
    Downloads: 1,980 This Week
    Last Update:
    See Project
  • 6
    Flowseal

    Flowseal

    Bypass regional or ISP-level restrictions on services like Discord

    ...It packages configurations and executable scripts (e.g., batch files) that leverage system-level filtering or packet redirection techniques (such as WinDivert or other strategies) to modify network behavior so that traffic destined for these services appears indistinguishable from unrestricted traffic. The project includes ways to install system services, update host rules, and test different strategies for unblocking or rerouting traffic. Because it directly touches network stacks and routing, its usage is typically technical and can require careful configuration to avoid destabilizing network settings.
    Downloads: 1,349 This Week
    Last Update:
    See Project
  • 7
    ntopng

    ntopng

    Web-based Traffic and Security Network Traffic Monitoring

    ntopng® is a web-based network traffic monitoring application released under GPLv3. It is the new incarnation of the original ntop written in 1998, and is now revamped in terms of performance, usability, and features. ntopng is a network traffic probe that provides 360° Network visibility, with its ability to gather traffic information from traffic mirrors, NetFlow exporters, SNMP devices, Firewall logs, and Intrusion Detection systems. ntopng has been written in a portable way in order to virtually run on every Unix platform, including Linux and FreeBSD, MacOS and on Windows as well. ntopng captures traffic from SPAN/mirror ports or TAP devices using libpcap, or PF_RING (on Linux) for best performance. ...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 8
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers. ...
    Downloads: 1,169 This Week
    Last Update:
    See Project
  • 9
    Clash Party

    Clash Party

    Another Mihomo GUI

    Clash Party is a cross-platform graphical client built around the Mihomo (Clash Meta) core, designed to manage and route network traffic through configurable proxy protocols in a user-friendly desktop environment. It provides an advanced interface for configuring proxy rules, managing subscriptions, and optimizing network routing behavior across operating systems such as Windows, macOS, and Linux. The application integrates multiple proxy protocols, allowing users to route traffic through different nodes based on rules, performance, or geographic requirements. ...
    Downloads: 161 This Week
    Last Update:
    See Project
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • 10
    Kubernetes Network Policy Recipes

    Kubernetes Network Policy Recipes

    Example recipes for Kubernetes Network Policies that you can just copy

    ...These recipes help secure Kubernetes clusters by ensuring that pods communicate only with allowed peers, reduce attack surfaces, and enforce least-privilege connectivity at the network layer. The recipes scale from simple “deny all traffic by default” policies to more advanced micro-segmentation patterns for multi-tier apps (frontend/backends) and platform-level isolation for CI/CD systems or service meshes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Clash Meta for Android

    Clash Meta for Android

    A rule-based tunnel for Android

    Clash Meta for Android is an Android application that functions as a rule-based network tunneling and proxy management tool, enabling users to control how their internet traffic is routed through different proxy servers. Built on the Clash.Meta core, it allows advanced routing based on customizable rules, making it possible to selectively direct traffic for specific apps, domains, or regions. The application is commonly used for bypassing network restrictions, optimizing routing performance, and managing multiple proxy configurations in a unified interface. ...
    Downloads: 251 This Week
    Last Update:
    See Project
  • 12
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Contains the command-line client for Cloudflare Tunnel, a tunneling daemon that proxies traffic from the Cloudflare network to your origins. This daemon sits between Cloudflare network and your origin (e.g. a webserver). Cloudflare attracts client requests and sends them to you via this daemon, without requiring you to poke holes on your firewall --- your origin can remain as closed as possible. Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. ...
    Downloads: 419 This Week
    Last Update:
    See Project
  • 13
    go-network-analyzer - write the tcp,udp, 4tcp and 6tcp files stamped at time-date. - create all your tcp, udp, 4tcp and 6tcp connections for any host/container. - the files generated with the go-network-analyzer can be analyzer using my tcp-analyzer: https://github.com/codecreatede/tcp-analyzer ``` ➜ go-network-devops-systemd git:(main) ✗ go run main.go -h Provide the tcp, udp, 4tcp, 6tcp or the port for the check for the running containers ip address Usage: options [flags] Flags: -h, --help help for options -t, --tcp string tcp as a flag (default "provide the tcp") -f, --tcp4 string tcp4 as a flag (default "provide the tcp4") -s, --tcp6 string tcp6 as a flag (default "provide the tcp") -u, --udp string udp as a flag (default "provide the udp") ➜ go-network-devops-systemd git:(main) ✗ go run main.go -s tcp6 ➜ go-network-devops-systemd git:(main) ✗ ls -la total 11060 drwxr-xr-x. 1 gauravsablok gauravsablok 254 Oct 1 22
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    V2Fly

    V2Fly

    A platform for building proxies to bypass network restrictions

    V2Fly Project V is a set of network tools that helps you to build your own computer network. It secures your network connections and thus protects your privacy. Help you build an exclusive basic communication network. A V2Ray process can concurrently support multiple inbound and outbound protocols, and each protocol can work independently. Inbound traffic can be sent from different outlets according to the configuration.
    Downloads: 118 This Week
    Last Update:
    See Project
  • 15
    Clash Verge Rev

    Clash Verge Rev

    A modern GUI client based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 249 This Week
    Last Update:
    See Project
  • 16
    Lokinet

    Lokinet

    Lokinet is an anonymous, decentralized and IP based overlay network

    Lokinet is a privacy-focused, onion-routing network protocol that enables users to browse the internet anonymously. It facilitates secure and private communication by routing traffic through multiple nodes, concealing users' IP addresses. Lokinet is powered by a decentralized network of staked nodes. Nobody can shut it down. Nobody can spy on you. Lokinet traffic is onion-routed.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 17
    simplewall

    simplewall

    Simple tool to configure Windows Filtering Platform (WFP)

    simplewall is an open-source Windows application that provides a user-friendly firewall control interface powered by Windows Filtering Platform (WFP), enabling users to block or allow outgoing and incoming network connections without diving into complex OS settings or command-line tools. The app presents a clean, intuitive UI where users can define rules based on process names, IP addresses, ports, and protocols, making it possible to restrict apps from accessing the internet or control specific traffic flows with fine granularity. Because simplewall leverages WFP directly, it operates at a low level in the network stack, ensuring reliable enforcement of rules system-wide while remaining lightweight. ...
    Downloads: 52 This Week
    Last Update:
    See Project
  • 18
    Clash Verge

    Clash Verge

    A Clash Meta GUI based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 358 This Week
    Last Update:
    See Project
  • 19
    ProxyPin

    ProxyPin

    Open source free capture HTTP(S) traffic software ProxyPin

    ProxyPin is a full-featured, cross-platform HTTP(S) traffic capture and proxy tool. Developed in Flutter, it enables interception, inspection, rewriting, and blocking of network traffic across devices via scans and QR-based connection. It supports scripting, filtering, statistics, and integrates HTTP/2, zstd, WebSocket parsing, and AES tools.
    Downloads: 46 This Week
    Last Update:
    See Project
  • 20
    Tun2Socks

    Tun2Socks

    tun2socks , powered by gVisor TCP/IP stack

    Proxy Everything: Handle all network traffic of any internet programs sent by the device through a proxy. Proxy Protocols: HTTP/Socks4/Socks5/Shadowsocks with authentication support for remote connections. Run Everywhere. Linux/macOS/Windows/FreeBSD/OpenBSD multi-platform support with specific optimization. Gateway Mode: Act as a layer three gateway to handle network traffic from other devices in the same network.
    Downloads: 59 This Week
    Last Update:
    See Project
  • 21
    I2P

    I2P

    I2P is an anonymizing network to securely communicate

    ...I2P hides the server from the user and the user from the server. All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet. It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally, I2P offers resistance to pattern recognition and blocking by censors.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 22
    Onion Browser

    Onion Browser

    An open-source, privacy-enhancing web browser for iOS

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Onion Browser is your trusted connection to Tor on iOS. Tor offers the highest standard of privacy.
    Downloads: 158 This Week
    Last Update:
    See Project
  • 23
    InterceptSuite

    InterceptSuite

    A TLS MITM proxy for Non-HTTP traffic, with support for TLS upgrades

    InterceptSuite is a cross‑platform, SOCKS5‑based MITM proxy specially designed to intercept, inspect, analyze, and manipulate encrypted network traffic at the TCP/TLS layer. It goes beyond HTTP‑focused tools like Burp Suite and ZAP by providing universal TLS interception—including STARTTLS and non‑HTTP protocols—offering deep visibility and control for security testing and debugging. InterceptSuite bridges this gap by providing a universal TLS interception engine that works with any protocol, giving security researchers the tools they need to analyze, understand, and test encrypted communications effectively. ...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 24
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    Project X is a powerful and extensible network proxy platform designed to provide advanced routing, tunneling, and traffic obfuscation capabilities. Originating from the XTLS protocol ecosystem, it serves as the core engine behind a wide variety of tools used for secure communication and bypassing network restrictions. The project supports multiple protocols such as VLESS, VMess, Shadowsocks, and Trojan, enabling flexible configuration for different networking scenarios. ...
    Downloads: 40 This Week
    Last Update:
    See Project
  • 25
    OpenNMS

    OpenNMS

    Enterprise-Grade Open-Source Network Management Platform

    OpenNMS is an open-source network monitoring platform that helps you visualize and monitor everything on your local and distributed networks. OpenNMS offers comprehensive fault, performance, and traffic monitoring with alarm generation in one place. Highly customizable and scalable, OpenNMS integrates with your core business applications and workflows.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB