Search Results for "network traffic generator"

Showing 1087 open source projects for "network traffic generator"

View related business solutions
  • Get full visibility and control over your tasks and projects with Wrike. Icon
    Get full visibility and control over your tasks and projects with Wrike.

    A cloud-based collaboration, work management, and project management software

    Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
    Learn More
  • No-code automation to improve your process workflows Icon
    No-code automation to improve your process workflows

    Pipefy is a digital automation software that centralizes data and standardizes workflows for teams like Finance and HR

    Transform your financial and HR operations and improve efficiency even remotely with digital, customized workflows that your team can automate and integrate with other software without the need of IT development.
    Try For Free
  • 1
    Network Flight Simulator

    Network Flight Simulator

    A utility to safely generate malicious network traffic patterns

    flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility. The tool performs tests to simulate DNS tunneling, DGA traffic, requests to known active C2 destinations, and other suspicious traffic patterns.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    Sniffnet

    Sniffnet

    Application to comfortably monitor your Internet traffic

    Application to comfortably monitor your Internet traffic. Multithreaded, cross-platform, and reliable. Sniffnet is completely free, open-source software which needs lots of effort and time to develop and maintain. Save complete textual reports with detailed information for each network connections. Get details about domain names and network providers of the hosts you are exchanging traffic with.
    Downloads: 54 This Week
    Last Update:
    See Project
  • 3
    Zapret Discord YouTube

    Zapret Discord YouTube

    Windows-based network traffic manipulation tool

    Zapret Discord YouTube is a Windows-based network traffic manipulation tool designed to bypass internet restrictions and throttling applied to services such as YouTube and Discord by modifying how traffic is handled at the packet level. The project is built on top of the broader “zapret” ecosystem and uses WinDivert, a low-level packet interception driver, to filter, split, and alter network packets in real time in order to evade deep packet inspection (DPI) systems used by ISPs or governments. ...
    Downloads: 2,001 This Week
    Last Update:
    See Project
  • 4
    Flowseal

    Flowseal

    Bypass regional or ISP-level restrictions on services like Discord

    ...It packages configurations and executable scripts (e.g., batch files) that leverage system-level filtering or packet redirection techniques (such as WinDivert or other strategies) to modify network behavior so that traffic destined for these services appears indistinguishable from unrestricted traffic. The project includes ways to install system services, update host rules, and test different strategies for unblocking or rerouting traffic. Because it directly touches network stacks and routing, its usage is typically technical and can require careful configuration to avoid destabilizing network settings.
    Downloads: 1,247 This Week
    Last Update:
    See Project
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
    Try for free
  • 5
    ntopng

    ntopng

    Web-based Traffic and Security Network Traffic Monitoring

    ntopng® is a web-based network traffic monitoring application released under GPLv3. It is the new incarnation of the original ntop written in 1998, and is now revamped in terms of performance, usability, and features. ntopng is a network traffic probe that provides 360° Network visibility, with its ability to gather traffic information from traffic mirrors, NetFlow exporters, SNMP devices, Firewall logs, and Intrusion Detection systems. ntopng has been written in a portable way in order to virtually run on every Unix platform, including Linux and FreeBSD, MacOS and on Windows as well. ntopng captures traffic from SPAN/mirror ports or TAP devices using libpcap, or PF_RING (on Linux) for best performance. ...
    Downloads: 43 This Week
    Last Update:
    See Project
  • 6
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers. ...
    Downloads: 1,073 This Week
    Last Update:
    See Project
  • 7
    Clash Party

    Clash Party

    Another Mihomo GUI

    Clash Party is a cross-platform graphical client built around the Mihomo (Clash Meta) core, designed to manage and route network traffic through configurable proxy protocols in a user-friendly desktop environment. It provides an advanced interface for configuring proxy rules, managing subscriptions, and optimizing network routing behavior across operating systems such as Windows, macOS, and Linux. The application integrates multiple proxy protocols, allowing users to route traffic through different nodes based on rules, performance, or geographic requirements. ...
    Downloads: 127 This Week
    Last Update:
    See Project
  • 8
    Kubernetes Network Policy Recipes

    Kubernetes Network Policy Recipes

    Example recipes for Kubernetes Network Policies that you can just copy

    ...These recipes help secure Kubernetes clusters by ensuring that pods communicate only with allowed peers, reduce attack surfaces, and enforce least-privilege connectivity at the network layer. The recipes scale from simple “deny all traffic by default” policies to more advanced micro-segmentation patterns for multi-tier apps (frontend/backends) and platform-level isolation for CI/CD systems or service meshes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Clash Meta for Android

    Clash Meta for Android

    A rule-based tunnel for Android

    Clash Meta for Android is an Android application that functions as a rule-based network tunneling and proxy management tool, enabling users to control how their internet traffic is routed through different proxy servers. Built on the Clash.Meta core, it allows advanced routing based on customizable rules, making it possible to selectively direct traffic for specific apps, domains, or regions. The application is commonly used for bypassing network restrictions, optimizing routing performance, and managing multiple proxy configurations in a unified interface. ...
    Downloads: 247 This Week
    Last Update:
    See Project
  • More Bookings. Better Experience. Icon
    More Bookings. Better Experience.

    For tour and activity providers

    The all-in-one solution built to help you stay organised and get more bookings with thousands of connections to online travel agencies (OTAs), resellers and suppliers.
    Learn More
  • 10
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Contains the command-line client for Cloudflare Tunnel, a tunneling daemon that proxies traffic from the Cloudflare network to your origins. This daemon sits between Cloudflare network and your origin (e.g. a webserver). Cloudflare attracts client requests and sends them to you via this daemon, without requiring you to poke holes on your firewall --- your origin can remain as closed as possible. Extensive documentation can be found in the Cloudflare Tunnel section of the Cloudflare Docs. ...
    Downloads: 405 This Week
    Last Update:
    See Project
  • 11
    V2Fly

    V2Fly

    A platform for building proxies to bypass network restrictions

    V2Fly Project V is a set of network tools that helps you to build your own computer network. It secures your network connections and thus protects your privacy. Help you build an exclusive basic communication network. A V2Ray process can concurrently support multiple inbound and outbound protocols, and each protocol can work independently. Inbound traffic can be sent from different outlets according to the configuration.
    Downloads: 119 This Week
    Last Update:
    See Project
  • 12
    Clash Verge Rev

    Clash Verge Rev

    A modern GUI client based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 253 This Week
    Last Update:
    See Project
  • 13
    Lokinet

    Lokinet

    Lokinet is an anonymous, decentralized and IP based overlay network

    Lokinet is a privacy-focused, onion-routing network protocol that enables users to browse the internet anonymously. It facilitates secure and private communication by routing traffic through multiple nodes, concealing users' IP addresses. Lokinet is powered by a decentralized network of staked nodes. Nobody can shut it down. Nobody can spy on you. Lokinet traffic is onion-routed.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 14
    simplewall

    simplewall

    Simple tool to configure Windows Filtering Platform (WFP)

    simplewall is an open-source Windows application that provides a user-friendly firewall control interface powered by Windows Filtering Platform (WFP), enabling users to block or allow outgoing and incoming network connections without diving into complex OS settings or command-line tools. The app presents a clean, intuitive UI where users can define rules based on process names, IP addresses, ports, and protocols, making it possible to restrict apps from accessing the internet or control specific traffic flows with fine granularity. Because simplewall leverages WFP directly, it operates at a low level in the network stack, ensuring reliable enforcement of rules system-wide while remaining lightweight. ...
    Downloads: 50 This Week
    Last Update:
    See Project
  • 15
    Clash Verge

    Clash Verge

    A Clash Meta GUI based on Tauri

    Clash Verge Rev is an open-source desktop application that provides a modern graphical interface for managing network proxy configurations and routing internet traffic through rule-based tunneling systems. Built using the Tauri framework and Rust, it delivers a lightweight yet high-performance experience across Windows, macOS, and Linux platforms. The application is based on the Mihomo (formerly Clash Meta) core, which enables advanced proxy routing capabilities, allowing users to define rules for how network traffic is handled and routed through different proxy nodes. ...
    Downloads: 342 This Week
    Last Update:
    See Project
  • 16
    ProxyPin

    ProxyPin

    Open source free capture HTTP(S) traffic software ProxyPin

    ProxyPin is a full-featured, cross-platform HTTP(S) traffic capture and proxy tool. Developed in Flutter, it enables interception, inspection, rewriting, and blocking of network traffic across devices via scans and QR-based connection. It supports scripting, filtering, statistics, and integrates HTTP/2, zstd, WebSocket parsing, and AES tools.
    Downloads: 46 This Week
    Last Update:
    See Project
  • 17
    Tun2Socks

    Tun2Socks

    tun2socks , powered by gVisor TCP/IP stack

    Proxy Everything: Handle all network traffic of any internet programs sent by the device through a proxy. Proxy Protocols: HTTP/Socks4/Socks5/Shadowsocks with authentication support for remote connections. Run Everywhere. Linux/macOS/Windows/FreeBSD/OpenBSD multi-platform support with specific optimization. Gateway Mode: Act as a layer three gateway to handle network traffic from other devices in the same network.
    Downloads: 58 This Week
    Last Update:
    See Project
  • 18
    I2P

    I2P

    I2P is an anonymizing network to securely communicate

    ...I2P hides the server from the user and the user from the server. All I2P traffic is internal to the I2P network. Traffic inside I2P does not interact with the Internet directly. It is a layer on top of the Internet. It uses encrypted unidirectional tunnels between you and your peers. No one can see where traffic is coming from, where it is going, or what the contents are. Additionally, I2P offers resistance to pattern recognition and blocking by censors.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 19
    OpenAPI

    OpenAPI

    OpenAPI helper and code generator for Julia

    This is the Julia library needed along with code generated by the OpenAPI generator to help define, produce and consume OpenAPI interfaces. The goal of OpenAPI is to define a standard, language-agnostic interface to REST APIs which allows both humans and computers to discover and understand the capabilities of the service without access to source code, documentation, or through network traffic inspection. When properly defined via OpenAPI, a consumer can understand and interact with the remote service with a minimal amount of implementation logic. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 20
    Onion Browser

    Onion Browser

    An open-source, privacy-enhancing web browser for iOS

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Onion Browser is your trusted connection to Tor on iOS. Tor offers the highest standard of privacy.
    Downloads: 155 This Week
    Last Update:
    See Project
  • 21
    OpenNMS

    OpenNMS

    Enterprise-Grade Open-Source Network Management Platform

    OpenNMS is an open-source network monitoring platform that helps you visualize and monitor everything on your local and distributed networks. OpenNMS offers comprehensive fault, performance, and traffic monitoring with alarm generation in one place. Highly customizable and scalable, OpenNMS integrates with your core business applications and workflows.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 22
    InterceptSuite

    InterceptSuite

    A TLS MITM proxy for Non-HTTP traffic, with support for TLS upgrades

    InterceptSuite is a cross‑platform, SOCKS5‑based MITM proxy specially designed to intercept, inspect, analyze, and manipulate encrypted network traffic at the TCP/TLS layer. It goes beyond HTTP‑focused tools like Burp Suite and ZAP by providing universal TLS interception—including STARTTLS and non‑HTTP protocols—offering deep visibility and control for security testing and debugging. InterceptSuite bridges this gap by providing a universal TLS interception engine that works with any protocol, giving security researchers the tools they need to analyze, understand, and test encrypted communications effectively. ...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 23
    Project X

    Project X

    Originates from XTLS protocol, providing a set of network tools

    Project X is a powerful and extensible network proxy platform designed to provide advanced routing, tunneling, and traffic obfuscation capabilities. Originating from the XTLS protocol ecosystem, it serves as the core engine behind a wide variety of tools used for secure communication and bypassing network restrictions. The project supports multiple protocols such as VLESS, VMess, Shadowsocks, and Trojan, enabling flexible configuration for different networking scenarios. ...
    Downloads: 36 This Week
    Last Update:
    See Project
  • 24
    Proton VPN for Android

    Proton VPN for Android

    ProtonVPN Android app

    ...You can now securely and privately browse the internet. The datat traveling between your device and the VPN server is encrypted. Secure Core protects your connection by routing your traffic through multiple servers before it leaves our network, defending you against advanced, network-based attacks.
    Downloads: 1,268 This Week
    Last Update:
    See Project
  • 25
    TG WS Proxy

    TG WS Proxy

    Local MTProto proxy server for partial bypassing of Telegram loading

    TG WS Proxy is a lightweight proxy server designed to enable Telegram connectivity over WebSocket, particularly in environments where direct access to Telegram servers is restricted. It allows Telegram clients to communicate through alternative transport layers, bypassing network limitations or censorship mechanisms. The project focuses on simplicity and efficiency, providing a minimal setup that can be deployed quickly on various platforms. It supports secure communication and can be...
    Downloads: 250 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB