Showing 1491 open source projects for "internet traffic log"

View related business solutions
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Zapret Discord YouTube

    Zapret Discord YouTube

    Windows-based network traffic manipulation tool

    Zapret Discord YouTube is a Windows-based network traffic manipulation tool designed to bypass internet restrictions and throttling applied to services such as YouTube and Discord by modifying how traffic is handled at the packet level. The project is built on top of the broader “zapret” ecosystem and uses WinDivert, a low-level packet interception driver, to filter, split, and alter network packets in real time in order to evade deep packet inspection (DPI) systems used by ISPs or governments. ...
    Downloads: 431 This Week
    Last Update:
    See Project
  • 2
    Sniffnet

    Sniffnet

    Application to comfortably monitor your Internet traffic

    Application to comfortably monitor your Internet traffic. Multithreaded, cross-platform, and reliable. Sniffnet is completely free, open-source software which needs lots of effort and time to develop and maintain. Save complete textual reports with detailed information for each network connections. Get details about domain names and network providers of the hosts you are exchanging traffic with.
    Downloads: 58 This Week
    Last Update:
    See Project
  • 3
    Proton VPN for Android

    Proton VPN for Android

    ProtonVPN Android app

    ...You can now securely and privately browse the internet. The datat traveling between your device and the VPN server is encrypted. Secure Core protects your connection by routing your traffic through multiple servers before it leaves our network, defending you against advanced, network-based attacks.
    Downloads: 525 This Week
    Last Update:
    See Project
  • 4
    ProxyPin

    ProxyPin

    Open source free capture HTTP(S) traffic software ProxyPin

    ProxyPin is a full-featured, cross-platform HTTP(S) traffic capture and proxy tool. Developed in Flutter, it enables interception, inspection, rewriting, and blocking of network traffic across devices via scans and QR-based connection. It supports scripting, filtering, statistics, and integrates HTTP/2, zstd, WebSocket parsing, and AES tools.
    Downloads: 51 This Week
    Last Update:
    See Project
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 5
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Contains the command-line client for Cloudflare Tunnel, a tunneling daemon that proxies traffic from the Cloudflare network to your origins. This daemon sits between Cloudflare network and your origin (e.g. a webserver). Cloudflare attracts client requests and sends them to you via this daemon, without requiring you to poke holes on your firewall --- your origin can remain as closed as possible. Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. All...
    Downloads: 259 This Week
    Last Update:
    See Project
  • 6
    AWS VPC Terraform module

    AWS VPC Terraform module

    Terraform module which creates VPC resources on AWS

    ...This prevents the destruction of the VPC from releasing those IPs, while making it possible that a re-created VPC uses the same IPs. By default, if NAT Gateways are enabled, private subnets will be configured with routes for Internet traffic that point at the NAT Gateways configured by use of the above options. Since AWS Lambda functions allocate Elastic Network Interfaces in proportion to the traffic received, it can be useful to allocate a large private subnet for such allocations, while keeping the traffic they generate entirely internal to the VPC.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Portable OpenSSH

    Portable OpenSSH

    Complete implementation of the SSH protocol

    ...It originates from the OpenSSH project maintained by the OpenBSD community and adapts the core OpenBSD implementation so it can run on many operating systems including Linux, macOS, and Windows. The software suite enables administrators and developers to securely log into remote systems, transfer files, and create encrypted tunnels for network traffic. By encrypting all communications between client and server, it protects against threats such as eavesdropping, connection hijacking, and data interception. The portable distribution follows the development of the main OpenSSH codebase while adding compatibility layers for multiple operating systems and authentication systems.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    Clash Party

    Clash Party

    Another Mihomo GUI

    Clash Party is a cross-platform graphical client built around the Mihomo (Clash Meta) core, designed to manage and route network traffic through configurable proxy protocols in a user-friendly desktop environment. It provides an advanced interface for configuring proxy rules, managing subscriptions, and optimizing network routing behavior across operating systems such as Windows, macOS, and Linux. The application integrates multiple proxy protocols, allowing users to route traffic through...
    Downloads: 91 This Week
    Last Update:
    See Project
  • 9
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers. Zapret implements multiple...
    Downloads: 344 This Week
    Last Update:
    See Project
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 10
    Clash Verge

    Clash Verge

    A Clash Meta GUI based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 563 This Week
    Last Update:
    See Project
  • 11
    Flowseal

    Flowseal

    Bypass regional or ISP-level restrictions on services like Discord

    Flowseal is a community-hosted repository that provides tools and scripts intended to help users bypass regional or ISP-level restrictions on services like Discord and YouTube, commonly blocked in certain countries or networks. It packages configurations and executable scripts (e.g., batch files) that leverage system-level filtering or packet redirection techniques (such as WinDivert or other strategies) to modify network behavior so that traffic destined for these services appears...
    Downloads: 104 This Week
    Last Update:
    See Project
  • 12
    Clash Meta for Android

    Clash Meta for Android

    A rule-based tunnel for Android

    Clash Meta for Android is an Android application that functions as a rule-based network tunneling and proxy management tool, enabling users to control how their internet traffic is routed through different proxy servers. Built on the Clash.Meta core, it allows advanced routing based on customizable rules, making it possible to selectively direct traffic for specific apps, domains, or regions. The application is commonly used for bypassing network restrictions, optimizing routing performance, and managing multiple proxy configurations in a unified interface. ...
    Downloads: 247 This Week
    Last Update:
    See Project
  • 13
    Clash Verge Rev

    Clash Verge Rev

    A modern GUI client based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 347 This Week
    Last Update:
    See Project
  • 14
    Lokinet

    Lokinet

    Lokinet is an anonymous, decentralized and IP based overlay network

    Lokinet is a privacy-focused, onion-routing network protocol that enables users to browse the internet anonymously. It facilitates secure and private communication by routing traffic through multiple nodes, concealing users' IP addresses. Lokinet is powered by a decentralized network of staked nodes. Nobody can shut it down. Nobody can spy on you. Lokinet traffic is onion-routed. Your browsing is private, secure, and anonymous. Lokinet hides your IP.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 15
    go-mitmproxy

    go-mitmproxy

    mitmproxy implemented with golang

    go-mitmproxy is a Golang implementation of mitmproxy that supports man-in-the-middle attacks and parsing, monitoring, and tampering with HTTP/HTTPS traffic. Parses HTTP/HTTPS traffic and displays traffic details via a web interface. Supports a plugin mechanism for easily extending functionality. Various event hooks can be found in the examples directory. HTTPS certificate handling is compatible with mitmproxy and stored in the ~/.mitmproxy folder. If the root certificate is already trusted...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    V2Fly

    V2Fly

    A platform for building proxies to bypass network restrictions

    V2Fly Project V is a set of network tools that helps you to build your own computer network. It secures your network connections and thus protects your privacy. Help you build an exclusive basic communication network. A V2Ray process can concurrently support multiple inbound and outbound protocols, and each protocol can work independently. Inbound traffic can be sent from different outlets according to the configuration. Easily implement distribution by region or domain name to achieve...
    Downloads: 37 This Week
    Last Update:
    See Project
  • 17
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN Client (Desktop+Mobile)

    Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server on your server.
    Downloads: 2,051 This Week
    Last Update:
    See Project
  • 18
    I2P

    I2P

    I2P is an anonymizing network to securely communicate

    ...In some cases people rely on the network when they need to be discrete or are doing sensitive work. I2P hides the server from the user and the user from the server. All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet. It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally, I2P offers resistance to pattern recognition and blocking by censors.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 19
    Proton VPN Browser Extension

    Proton VPN Browser Extension

    Proton VPN Browser Extension

    The Proton VPN Browser Extension repository houses the code for an official browser extension that lets users quickly secure their web browsing traffic through ProtonVPN from within browsers like Firefox and Chrome without routing all system traffic. This extension provides users with a convenient way to encrypt and anonymize HTTP requests, hide IP addresses, and prevent tracking while browsing, acting independently of the full OS-level VPN clients. Because browser extensions are constrained...
    Downloads: 64 This Week
    Last Update:
    See Project
  • 20
    Logbook

    Logbook

    An extensible Java library for HTTP request and response logging

    Logbook is an extensible Java library to enable complete request and response logging for different client- and server-side technologies. It satisfies a special need by a) allowing web application developers to log any HTTP traffic that an application receives or sends b) in a way that makes it easy to persist and analyze it later. This can be useful for traditional log analysis, meeting audit requirements or investigating individual historic traffic issues. Logbook is ready to use out of the box for most common setups. Even for uncommon applications and technologies, it should be simple to implement the necessary interfaces to connect a library/framework/etc. to it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    GoAccess

    GoAccess

    GoAccess is a real-time web log analyzer and interactive viewer

    GoAccess is an open-source, real-time log analyzer and interactive viewer for web server logs. It runs in terminals on UNIX-like systems and can generate standalone HTML, JSON, or CSV reports for browser-based analysis. GoAccess offers enhanced WebSocket authentication, supporting local and external JWT verification, with secure token refresh capabilities and seamless integration with external authentication systems. GoAccess allows any custom log format string. Predefined options include,...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    Onion Browser

    Onion Browser

    An open-source, privacy-enhancing web browser for iOS

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Onion Browser is your trusted connection to Tor on iOS. Tor offers the highest standard of privacy. You are not linked to your browsing activity. Your location doesn't influence the websites you’re able to visit....
    Downloads: 112 This Week
    Last Update:
    See Project
  • 23
    mitmproxy

    mitmproxy

    A free and open source interactive HTTPS proxy

    mitmproxy is an open source, interactive SSL/TLS-capable intercepting HTTP proxy, with a console interface fit for HTTP/1, HTTP/2, and WebSockets. It's the ideal tool for penetration testers and software developers, able to debug, test, and make privacy measurements. It can intercept, inspect, modify and replay web traffic, and can even prettify and decode a variety of message types. Its web-based interface mitmweb gives you a similar experience as Chrome's DevTools, with the addition of...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 24
    Iran Internet Traffic Visualizer

    Iran Internet Traffic Visualizer

    Iran Internet Traffic Visualizer

    Iran Internet Traffic Visualizer is a free tool that shows how internet data usage in Iran changes over time. It helps users observe daily activity patterns and detect major internet disruptions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Simple HTTP  Server

    Simple HTTP Server

    Simple http server in Rust (Windows/Mac/Linux)

    Simple HTTP server in Rust (Windows/Mac/Linux) Windows support (with colored log). Specify listen to address (ip, port), specify running threads, and specify the root directory. Nginx like directory view (directory entries, link, filesize, modified date) Breadcrumb navigation.
    Downloads: 35 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB