Showing 27 open source projects for "traffic"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 1
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    ...All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 327 This Week
    Last Update:
    See Project
  • 2
    go-mitmproxy

    go-mitmproxy

    mitmproxy implemented with golang

    go-mitmproxy is a Golang implementation of mitmproxy that supports man-in-the-middle attacks and parsing, monitoring, and tampering with HTTP/HTTPS traffic. Parses HTTP/HTTPS traffic and displays traffic details via a web interface. Supports a plugin mechanism for easily extending functionality. Various event hooks can be found in the examples directory. HTTPS certificate handling is compatible with mitmproxy and stored in the ~/.mitmproxy folder. If the root certificate is already trusted from the previous use of mitmproxy, go-mitmproxy can use it directly. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3
    mitmproxy

    mitmproxy

    A free and open source interactive HTTPS proxy

    ...It's the ideal tool for penetration testers and software developers, able to debug, test, and make privacy measurements. It can intercept, inspect, modify and replay web traffic, and can even prettify and decode a variety of message types. Its web-based interface mitmweb gives you a similar experience as Chrome's DevTools, with the addition of features like request interception and replay. Its command-line version mitmdump allows you to write powerful addons and script mitmproxy so it can automatically modify messages, redirect traffic, and perform many other custom commands.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 4
    SMTP Tunnel Proxy

    SMTP Tunnel Proxy

    A high-speed covert tunnel that disguises TCP traffic as SMTP email

    SMTP Tunnel Proxy is a high-speed covert tunneling proxy that disguises regular TCP traffic as legitimate SMTP email communication to evade deep packet inspection (DPI) firewalls and censorship systems. It implements a SOCKS5 proxy interface on the client that wraps outbound traffic into an SMTP-like handshake (EHLO, STARTTLS, AUTH) and encrypted payload, making the session appear to DPI systems as a normal email exchange.
    Downloads: 2 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    V2Fly

    V2Fly

    A platform for building proxies to bypass network restrictions

    ...Nodes of V2Ray can be disguised as a normal website (HTTPS) to confuse its traffic with normal web traffic to avoid third-party interference. Universal reverse proxy support can achieve intranet penetration.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 6
    Easegress

    Easegress

    A Cloud Native traffic orchestration system

    ...Easegress can be a typical seven-level API Gateway, it also can be a side-car to be a Service Mesh, and Easegress can perfectly work with other software to ship powerful features, such as: Kubernetes Ingress, Knaitve FaaS, and Eureka/Consul/Etcd/Nacos and so on. The Easegress can management the traffic and APIs, not only can do load balancing, canary development but also can aggregate and pipeline a number of APIs. This function automatically helps the website optimize its performance, such as: adding the cache, merging the requests, and reducing the network bandwidth. Sometimes, a site could have unexpectedly higher traffic, the Ease Gateway could help to protect the critical service for critical customers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    1337x Proxy List

    1337x Proxy List

    1337x Proxy List for 2026

    1337x Proxy List is an open-source repository that curates a collection of proxy and mirror sites designed to provide access to the 1337x torrent platform when it is blocked or restricted in certain regions. The project aggregates and maintains a list of working proxy URLs that allow users to bypass ISP or government restrictions by routing traffic through alternative domains. These proxy sites replicate the original 1337x interface and functionality, enabling users to browse, search, and download torrent files as if they were accessing the main site directly. The repository is updated periodically to ensure that listed proxies remain functional, as many of them may go offline or become blocked over time. ...
    Downloads: 196 This Week
    Last Update:
    See Project
  • 8
    Shadowsocks Rust

    Shadowsocks Rust

    A Rust port of shadowsocks

    Shadowsocks Rust is an open-source, high-performance implementation of the Shadowsocks secure proxy protocol written in Rust, designed to provide fast, encrypted SOCKS5-based tunneling to help users bypass network censorship and protect privacy. Shadowsocks itself is widely used to route internet traffic through an encrypted proxy, allowing secure access to blocked or restricted content while mitigating simple traffic-inspection techniques. By leveraging Rust, this implementation emphasizes memory safety, concurrency, and efficiency, making it suitable for both client and server use on devices ranging from small embedded systems to large servers. ...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 9
    ssl-proxy

    ssl-proxy

    Zero-config SSL reverse proxy with real autogenerated certificates

    Simple single-command SSL reverse proxy with autogenerated certificates (LetsEncrypt, self-signed) A handy and simple way to add SSL to your thing running on a VM--be it your personal jupyter notebook or your team jenkins instance. ssl-proxy autogenerates SSL certs and proxies HTTPS traffic to an existing HTTP server in a single command.
    Downloads: 23 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • 10
    V2Ray-Agent

    V2Ray-Agent

    Xray, Tuic, hysteria2, sing-box

    An all-in-one V2Ray/Xray agent script to automate proxy server deployment on Linux. Supports multiple protocols (VLESS, VMess, Shadowsocks, WireGuard), automatic certificate generation, CDN node management, and multi-VPS subscription configurations—often used for network optimization or censorship circumvention.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 11
    Traefik

    Traefik

    An open-source reverse proxy and load balancer

    Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that makes deploying microservices easy. Traefik integrates with your existing infrastructure components (Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS, ...) and configures itself automatically and dynamically. Pointing Traefik at your orchestrator should be the only configuration step you need.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 12
    Pangolin

    Pangolin

    Identity-Aware Tunneled Reverse Proxy Server with Dashboard UI

    ...It allows you to connect applications and resources behind firewalls or NATs to a central hub, using encrypted tunnels rather than opening public ports or relying entirely on VPNs. With Pangolin you can route traffic from across distributed networks, enforce contextual access rules (such as SSO, geolocation, time of day, IP restrictions), and manage all of your exposed resources in one dashboard. It supports multi-site deployments and highly-available node architectures, enabling you to own your infrastructure yet still get orchestration and control benefits. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    Pipy

    Pipy

    Pipy is a programmable proxy for the cloud, edge and IoT

    Pipy is a high performance programmable proxy for the cloud, edge and IoT. Its core is written in C++ with excellent cross-platform capability. It is both high performance and low resource. Pipy comes with a built-in JavaScript engine that allows easy custom logic implementation with the simple JS syntax, greatly reducing the complexity in high-performance network programming. It is suitable for a variety of hardware architectures including x86, ARM64, Loongson and RISC-V. It is also...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Pushpin

    Pushpin

    Proxy server for adding push to your API

    ...With Pushpin, API management systems can manage real-time endpoints. Authentication, analytics, etc. work as you'd expect. Pushpin listens on port 7999. Edit the routes file to point traffic to your backend. Make an endpoint on the backend that responds with instructional HTTP headers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    YARP

    YARP

    A toolkit for developing high-performance HTTP reverse proxy apps

    ...Each of these projects was doing something slightly off the beaten path which meant they were not well served by existing proxies, and customization of those proxies had a high cost and ongoing maintenance considerations. Many of the existing proxies were built to support HTTP/1.1, but with workloads changing to include gRPC traffic, they require HTTP/2 support which requires a significantly more complex implementation. By using YARP the projects get to customize the routing and handling behavior without having to implement the http protocol.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    TG WS Proxy

    TG WS Proxy

    Telegram SOCKS5 proxy with WebSocket (WSS) for acceleration and blocki

    ...The application runs entirely on the local machine and does not rely on external proxy servers, ensuring privacy and security. TG WS Proxy intelligently intercepts Telegram connections, detects the target data center (DC), and routes traffic through optimized WebSocket connections over TLS. This method improves connection stability and reduces latency, especially in restricted or unstable networks. If WebSocket transport is not available, the proxy automatically falls back to a direct TCP connection, ensuring uninterrupted Telegram access. TG WS Proxy supports Windows, macOS, and Linux, includes both GUI (system tray) and CLI modes, and offers easy setup with Telegram Desktop via SOCKS5 conf
    Leader badge
    Downloads: 495 This Week
    Last Update:
    See Project
  • 17
    NPS

    NPS

    Lightweight, high-performance, powerful intranet penetration proxy

    ...Https integration, support to convert backend proxy and web services to https, and support multiple certificates. Just simple configuration on web ui can complete most requirements. Complete information display, such as traffic, system information, real-time bandwidth, client version, etc. Powerful extension functions, everything is available (cache, compression, encryption, traffic limit, bandwidth limit, port reuse, etc.) Domain name resolution has functions such as custom headers, 404 page configuration, host modification, etc.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    Lanproxy

    Lanproxy

    Intranet penetration tool that proxies local area network computers

    Lanproxy is an intranet penetration tool that proxies local area network personal computers and servers to the public network. It supports tcp traffic forwarding and any tcp upper layer protocol (access to intranet websites, local payment interface debugging, ssh access, remote desktop, http proxy) , https proxy, socks5 proxy...). Penetration basic functions, same as the open source version, high performance, can support tens of thousands of penetration connections at the same time. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    Proxenet

    Proxenet

    The ONLY hacker friendly proxy for webapp pentests

    Proxenet is a hacker-friendly, DIY web proxy designed for web application penetration testing. Written in C, it allows interaction with higher-level languages like Python and Ruby for on-the-fly modification of HTTP requests and responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ngrok

    ngrok

    Unified ingress for developers

    ...You can think of ngrok as the front door to your applications. ngrok combines your reverse proxy, firewall, API gateway, and global load balancing into one. ngrok can capture and analyze all traffic to your web service for later inspection and replay.
    Downloads: 227 This Week
    Last Update:
    See Project
  • 21
    Z4 Phreak Tools 2.3

    Z4 Phreak Tools 2.3

    Modify Request and Response Header

    Version 2.3 Pro Edition is available (Mar/01/2015) What's new in version 2.3? - Fixed bugs Traffic - Fixed bugs Dialer - Fixed bugs Set Proxy IDM - Change Proxy Server (with listview) - Fixed bugs Query (add use query mode only) - Add New User-Agent to Query (SonyEriccson, NOKIA, Opera Mini, and Custom) - SMS (Create, Inbox, Outbox, Draft, Kontak) - Diagnostics Modem (Operator, Speed, RSSI, MCC, MNC, LAC, Cell ID, QoS, Sent, Recieved) - Set Network Type modem (3G Only, 3G Preferred, Edge Only, Edge Preferred) - Move Apps to main menu file (Tools > Apps External) - Move +Header to Header (in Manual mode configuration header) - Fixed bugs Lock GUI - Change main menu MDMA to PING - Fixed bugs GUI Header Log - New Icon for Change icon button - Add Updater - Fixed location tor.exe - Fixed Redial/ Reconnect (with count dial attemps) - Fixed Properties Modem (add number dial, use dns, disable netbios) Regards, Author : zaya razta (z4y4@bugs4u)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ModSecurity is a web application firewall that can work either embedded or as a reverse proxy. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23

    Log Analysis Tool Kit - LATK

    A tool suite for Log File Analysis

    This is a collection of command line and web based tools for use in incident response and long term analysis use as part of ongoing situational awareness. Often when responding to a security incident the only files available are web server and proxy server logs. The tools here will aid you in detecting odd traffic such as botnet beaconing and SQL Injection attempts. The large amount of data can be overwhelming and the tools in the Log Analysis Tool Kit can be used to parse these files and build a MySQL database for querying. Currently the log formats supported are: Proxy Logs: Squid Bluecoat Web Server Logs: Apache IIS Your feedback is always appreciated. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PHP Daemon & Frontend for Squid Web Proxy Server. Provides both User Based bandwidth Monitoring, and Squid Logfile Analysys. Allows users to generate graphs of traffic usage, based on many different factors.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    HTTPManifold takes incoming HTTP connections and forwards them to other servers (reverse proxy). A single IP address can handle multiple domains, and route requests to other networked machines. It allows for monitoring and debugging raw HTTP traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB