Showing 1545 open source projects for "traffic"

View related business solutions
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • Iris Powered By Generali - Iris puts your customer in control of their identity. Icon
    Iris Powered By Generali - Iris puts your customer in control of their identity.

    Increase customer and employee retention by offering Onwatch identity protection today.

    Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
    Learn More
  • 1
    Zapret Discord YouTube

    Zapret Discord YouTube

    Windows-based network traffic manipulation tool

    Zapret Discord YouTube is a Windows-based network traffic manipulation tool designed to bypass internet restrictions and throttling applied to services such as YouTube and Discord by modifying how traffic is handled at the packet level. The project is built on top of the broader “zapret” ecosystem and uses WinDivert, a low-level packet interception driver, to filter, split, and alter network packets in real time in order to evade deep packet inspection (DPI) systems used by ISPs or governments. ...
    Downloads: 2,040 This Week
    Last Update:
    See Project
  • 2
    Flowseal

    Flowseal

    Bypass regional or ISP-level restrictions on services like Discord

    ...It packages configurations and executable scripts (e.g., batch files) that leverage system-level filtering or packet redirection techniques (such as WinDivert or other strategies) to modify network behavior so that traffic destined for these services appears indistinguishable from unrestricted traffic. The project includes ways to install system services, update host rules, and test different strategies for unblocking or rerouting traffic. Because it directly touches network stacks and routing, its usage is typically technical and can require careful configuration to avoid destabilizing network settings.
    Downloads: 1,398 This Week
    Last Update:
    See Project
  • 3
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers. ...
    Downloads: 1,187 This Week
    Last Update:
    See Project
  • 4
    ntopng

    ntopng

    Web-based Traffic and Security Network Traffic Monitoring

    ntopng® is a web-based network traffic monitoring application released under GPLv3. It is the new incarnation of the original ntop written in 1998, and is now revamped in terms of performance, usability, and features. ntopng is a network traffic probe that provides 360° Network visibility, with its ability to gather traffic information from traffic mirrors, NetFlow exporters, SNMP devices, Firewall logs, and Intrusion Detection systems. ntopng has been written in a portable way in order to virtually run on every Unix platform, including Linux and FreeBSD, MacOS and on Windows as well. ntopng captures traffic from SPAN/mirror ports or TAP devices using libpcap, or PF_RING (on Linux) for best performance. ...
    Downloads: 37 This Week
    Last Update:
    See Project
  • Data management solutions for confident marketing Icon
    Data management solutions for confident marketing

    For companies wanting a complete Data Management solution that is native to Salesforce

    Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
    Learn More
  • 5
    Sniffnet

    Sniffnet

    Application to comfortably monitor your Internet traffic

    Application to comfortably monitor your Internet traffic. Multithreaded, cross-platform, and reliable. Sniffnet is completely free, open-source software which needs lots of effort and time to develop and maintain. Save complete textual reports with detailed information for each network connections. Get details about domain names and network providers of the hosts you are exchanging traffic with.
    Downloads: 33 This Week
    Last Update:
    See Project
  • 6
    Clash Party

    Clash Party

    Another Mihomo GUI

    ...It includes intelligent routing features, including AI-assisted node selection and rule-based traffic management, which help optimize latency and connection reliability. Clash Party also emphasizes usability with a modern interface, customizable themes, and visual tools for monitoring connections and traffic activity. It supports configuration backup and synchronization, making it easier to manage complex setups across devices.
    Downloads: 155 This Week
    Last Update:
    See Project
  • 7
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    ...All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 359 This Week
    Last Update:
    See Project
  • 8
    ProxyPin

    ProxyPin

    Open source free capture HTTP(S) traffic software ProxyPin

    ProxyPin is a full-featured, cross-platform HTTP(S) traffic capture and proxy tool. Developed in Flutter, it enables interception, inspection, rewriting, and blocking of network traffic across devices via scans and QR-based connection. It supports scripting, filtering, statistics, and integrates HTTP/2, zstd, WebSocket parsing, and AES tools.
    Downloads: 49 This Week
    Last Update:
    See Project
  • 9
    Kubeshark

    Kubeshark

    The API traffic viewer for Kubernetes providing deep visibility

    ...View all API traffic and payloads going in, out and across containers and pods inside a Kubernetes cluster. Search all real-time and historical recorded API traffic and payloads using a comprehensive query language. Monitors all API traffic and payloads to find API drift and API anomalies and trace them down to source. Instant service dependency mapping through real-time API traffic analysis.
    Downloads: 6 This Week
    Last Update:
    See Project
  • SoftCo: Enterprise Invoice and P2P Automation Software Icon
    SoftCo: Enterprise Invoice and P2P Automation Software

    For companies that process over 20,000 invoices per year

    SoftCo Accounts Payable Automation processes all PO and non-PO supplier invoices electronically from capture and matching through to invoice approval and query management. SoftCoAP delivers unparalleled touchless automation by embedding AI across matching, coding, routing, and exception handling to minimize the number of supplier invoices requiring manual intervention. The result is 89% processing savings, supported by a context-aware AI Assistant that helps users understand exceptions, answer questions, and take the right action faster.
    Learn More
  • 10
    Proxify

    Proxify

    A versatile and portable proxy for capturing HTTP/HTTPS traffic

    ...Supports multiple operations such as request/response dump, filtering and manipulation via DSL language, upstream HTTP/Socks5 proxy. Additionally, a replay utility allows to import the dumped traffic (request/responses with correct domain name) into BurpSuite or any other proxy by simply setting the upstream proxy to proxify.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 11
    go-mitmproxy

    go-mitmproxy

    mitmproxy implemented with golang

    go-mitmproxy is a Golang implementation of mitmproxy that supports man-in-the-middle attacks and parsing, monitoring, and tampering with HTTP/HTTPS traffic. Parses HTTP/HTTPS traffic and displays traffic details via a web interface. Supports a plugin mechanism for easily extending functionality. Various event hooks can be found in the examples directory. HTTPS certificate handling is compatible with mitmproxy and stored in the ~/.mitmproxy folder. If the root certificate is already trusted from the previous use of mitmproxy, go-mitmproxy can use it directly. ...
    Downloads: 31 This Week
    Last Update:
    See Project
  • 12
    InterceptSuite

    InterceptSuite

    A TLS MITM proxy for Non-HTTP traffic, with support for TLS upgrades

    InterceptSuite is a cross‑platform, SOCKS5‑based MITM proxy specially designed to intercept, inspect, analyze, and manipulate encrypted network traffic at the TCP/TLS layer. It goes beyond HTTP‑focused tools like Burp Suite and ZAP by providing universal TLS interception—including STARTTLS and non‑HTTP protocols—offering deep visibility and control for security testing and debugging. InterceptSuite bridges this gap by providing a universal TLS interception engine that works with any protocol, giving security researchers the tools they need to analyze, understand, and test encrypted communications effectively. ...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 13
    Clash Meta for Android

    Clash Meta for Android

    A rule-based tunnel for Android

    Clash Meta for Android is an Android application that functions as a rule-based network tunneling and proxy management tool, enabling users to control how their internet traffic is routed through different proxy servers. Built on the Clash.Meta core, it allows advanced routing based on customizable rules, making it possible to selectively direct traffic for specific apps, domains, or regions. The application is commonly used for bypassing network restrictions, optimizing routing performance, and managing multiple proxy configurations in a unified interface. ...
    Downloads: 237 This Week
    Last Update:
    See Project
  • 14
    Clash Verge

    Clash Verge

    A Clash Meta GUI based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 336 This Week
    Last Update:
    See Project
  • 15
    simplewall

    simplewall

    Simple tool to configure Windows Filtering Platform (WFP)

    ...The app presents a clean, intuitive UI where users can define rules based on process names, IP addresses, ports, and protocols, making it possible to restrict apps from accessing the internet or control specific traffic flows with fine granularity. Because simplewall leverages WFP directly, it operates at a low level in the network stack, ensuring reliable enforcement of rules system-wide while remaining lightweight. It also includes optional modes like blocking all inbound or outbound traffic except what’s explicitly allowed, and supports temporary rule application, logging, and diagnostic views to help users understand what traffic is being blocked or permitted.
    Downloads: 52 This Week
    Last Update:
    See Project
  • 16
    Clash Verge Rev

    Clash Verge Rev

    A modern GUI client based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 239 This Week
    Last Update:
    See Project
  • 17
    Proton VPN Browser Extension

    Proton VPN Browser Extension

    Proton VPN Browser Extension

    The Proton VPN Browser Extension repository houses the code for an official browser extension that lets users quickly secure their web browsing traffic through ProtonVPN from within browsers like Firefox and Chrome without routing all system traffic. This extension provides users with a convenient way to encrypt and anonymize HTTP requests, hide IP addresses, and prevent tracking while browsing, acting independently of the full OS-level VPN clients. Because browser extensions are constrained by browser APIs, this extension focuses on securing in-browser connections, protecting privacy specifically within the browser context rather than across the entire operating system. ...
    Downloads: 141 This Week
    Last Update:
    See Project
  • 18
    Argo Rollouts

    Argo Rollouts

    Progressive Delivery for Kubernetes

    Argo Rollouts is a Kubernetes controller and set of CRDs that provide advanced deployment capabilities such as blue-green, canary, canary analysis, experimentation, and progressive delivery features to Kubernetes. Argo Rollouts (optionally) integrates with ingress controllers and service meshes, leveraging their traffic shaping abilities to gradually shift traffic to the new version during an update. Additionally, Rollouts can query and interpret metrics from various providers to verify key KPIs and drive automated promotion or rollback during an update.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 19
    3X-UI

    3X-UI

    Xray panel supporting multi-protocol multi-user expire day

    3X‑UI is an enhanced fork of the X‑UI project, serving as a multifunctional web panel to manage VPN services. It supports multi‑protocol configurations (like VMess, VLESS, Trojan, Shadowsocks, WireGuard), offers traffic and user limits, SSL management, multilingual support, and integrates Telegram notifications for system events. Advanced, open-source web-based control panel designed for managing Xray-core server. It offers a user-friendly interface for configuring and monitoring various VPN and proxy protocols. As an enhanced fork of the original X-UI project, 3X-UI provides improved stability, broader protocol support, and additional features.
    Downloads: 75 This Week
    Last Update:
    See Project
  • 20
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN Client (Desktop+Mobile)

    Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server on your server.
    Downloads: 5,345 This Week
    Last Update:
    See Project
  • 21
    Lokinet

    Lokinet

    Lokinet is an anonymous, decentralized and IP based overlay network

    Lokinet is a privacy-focused, onion-routing network protocol that enables users to browse the internet anonymously. It facilitates secure and private communication by routing traffic through multiple nodes, concealing users' IP addresses. Lokinet is powered by a decentralized network of staked nodes. Nobody can shut it down. Nobody can spy on you. Lokinet traffic is onion-routed. Your browsing is private, secure, and anonymous. Lokinet hides your IP. Lokinet hides the IPs you connect to. Your location and identity are unknown.
    Downloads: 21 This Week
    Last Update:
    See Project
  • 22
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 23
    Envoy AI Gateway

    Envoy AI Gateway

    Manages Unified Access to Generative AI Services

    Envoy AI Gateway is an open-source gateway system designed to manage network traffic between applications and generative AI services using the Envoy proxy ecosystem. The project extends Envoy Gateway to support AI-specific workloads, enabling organizations to route, secure, and scale requests to large language models and other generative AI services. In a typical deployment, the architecture uses a two-tier gateway model where an outer gateway handles authentication, routing, and global rate limiting while a second gateway manages traffic to self-hosted model serving clusters. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 24
    Istio

    Istio

    Connect, secure, control, and observe services

    Istio is an open platform for connecting, securing, and managing microservices. It provides a uniform way of integrating microservices, managing traffic flow, enforcing policies and aggregating telemetry data. With its diverse feature set you can successfully and efficiently run a distributed microservice architecture, overall reducing deployment complexity and easing the strain on development teams. Istio currently supports Kubernetes and Consul-based environments, with plans to support additional platforms in the near future.
    Downloads: 42 This Week
    Last Update:
    See Project
  • 25
    Proton VPN for Android

    Proton VPN for Android

    ProtonVPN Android app

    ...You can now securely and privately browse the internet. The datat traveling between your device and the VPN server is encrypted. Secure Core protects your connection by routing your traffic through multiple servers before it leaves our network, defending you against advanced, network-based attacks.
    Downloads: 1,290 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB