Showing 321 open source projects for "traffic"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    ProxyPin

    ProxyPin

    Open source free capture HTTP(S) traffic software ProxyPin

    ProxyPin is a full-featured, cross-platform HTTP(S) traffic capture and proxy tool. Developed in Flutter, it enables interception, inspection, rewriting, and blocking of network traffic across devices via scans and QR-based connection. It supports scripting, filtering, statistics, and integrates HTTP/2, zstd, WebSocket parsing, and AES tools.
    Downloads: 36 This Week
    Last Update:
    See Project
  • 2
    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    Cloudflare Tunnel Client

    ...All usages related with proxying to your origins are available under cloudflared tunnel help. You can also use cloudflared to access Tunnel origins (that are protected with cloudflared tunnel) for TCP traffic at Layer 4 (i.e., not HTTP/web socket), which is relevant for use cases such as SSH, RDP, etc. Such usages are available under cloudflared access help.
    Downloads: 255 This Week
    Last Update:
    See Project
  • 3
    Proton VPN Browser Extension

    Proton VPN Browser Extension

    Proton VPN Browser Extension

    The Proton VPN Browser Extension repository houses the code for an official browser extension that lets users quickly secure their web browsing traffic through ProtonVPN from within browsers like Firefox and Chrome without routing all system traffic. This extension provides users with a convenient way to encrypt and anonymize HTTP requests, hide IP addresses, and prevent tracking while browsing, acting independently of the full OS-level VPN clients. Because browser extensions are constrained by browser APIs, this extension focuses on securing in-browser connections, protecting privacy specifically within the browser context rather than across the entire operating system. ...
    Downloads: 89 This Week
    Last Update:
    See Project
  • 4
    Lokinet

    Lokinet

    Lokinet is an anonymous, decentralized and IP based overlay network

    Lokinet is a privacy-focused, onion-routing network protocol that enables users to browse the internet anonymously. It facilitates secure and private communication by routing traffic through multiple nodes, concealing users' IP addresses. Lokinet is powered by a decentralized network of staked nodes. Nobody can shut it down. Nobody can spy on you. Lokinet traffic is onion-routed. Your browsing is private, secure, and anonymous. Lokinet hides your IP. Lokinet hides the IPs you connect to. Your location and identity are unknown.
    Downloads: 13 This Week
    Last Update:
    See Project
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 5
    Amnezia VPN

    Amnezia VPN

    Amnezia VPN Client (Desktop+Mobile)

    Amnezia is an open-source VPN client, with a key feature that enables you to deploy your own VPN server on your server.
    Downloads: 3,394 This Week
    Last Update:
    See Project
  • 6
    Clash for Android

    Clash for Android

    Mobile counterpart to desktop Clash clients for Android

    ...The application usually includes features like logs, traffic monitoring, and status indicators so users can see how rules are applied in real time, and it fits into Android’s VPN API to create a local virtual network interface for routing.
    Downloads: 145 This Week
    Last Update:
    See Project
  • 7
    Proton VPN for Android

    Proton VPN for Android

    ProtonVPN Android app

    ...You can now securely and privately browse the internet. The datat traveling between your device and the VPN server is encrypted. Secure Core protects your connection by routing your traffic through multiple servers before it leaves our network, defending you against advanced, network-based attacks.
    Downloads: 933 This Week
    Last Update:
    See Project
  • 8
    Clash for Windows

    Clash for Windows

    Windows GUI client application built on the Clash core proxy engine

    ...The application typically includes tools to import subscription URLs, live traffic statistics, log views, and configuration editors, reducing the complexity of managing text-based YAML configs manually.
    Downloads: 64 This Week
    Last Update:
    See Project
  • 9
    Onion Browser

    Onion Browser

    An open-source, privacy-enhancing web browser for iOS

    Encrypted traffic through the Tor network gives you the highest standard of security and privacy. No extra eyes see your activity, save your history or influence your browsing. Targeted ads are history. Tabs don’t hang around. They close when you’re done, so every search is new. Onion Browser is your trusted connection to Tor on iOS. Tor offers the highest standard of privacy.
    Downloads: 116 This Week
    Last Update:
    See Project
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
    Learn More
  • 10
    go-mitmproxy

    go-mitmproxy

    mitmproxy implemented with golang

    go-mitmproxy is a Golang implementation of mitmproxy that supports man-in-the-middle attacks and parsing, monitoring, and tampering with HTTP/HTTPS traffic. Parses HTTP/HTTPS traffic and displays traffic details via a web interface. Supports a plugin mechanism for easily extending functionality. Various event hooks can be found in the examples directory. HTTPS certificate handling is compatible with mitmproxy and stored in the ~/.mitmproxy folder. If the root certificate is already trusted from the previous use of mitmproxy, go-mitmproxy can use it directly. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    V2Fly

    V2Fly

    A platform for building proxies to bypass network restrictions

    ...Nodes of V2Ray can be disguised as a normal website (HTTPS) to confuse its traffic with normal web traffic to avoid third-party interference. Universal reverse proxy support can achieve intranet penetration.
    Downloads: 44 This Week
    Last Update:
    See Project
  • 12
    mitmproxy

    mitmproxy

    A free and open source interactive HTTPS proxy

    ...It's the ideal tool for penetration testers and software developers, able to debug, test, and make privacy measurements. It can intercept, inspect, modify and replay web traffic, and can even prettify and decode a variety of message types. Its web-based interface mitmweb gives you a similar experience as Chrome's DevTools, with the addition of features like request interception and replay. Its command-line version mitmdump allows you to write powerful addons and script mitmproxy so it can automatically modify messages, redirect traffic, and perform many other custom commands.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 13
    Trafexia

    Trafexia

    Mobile Traffic Interceptor

    Trafexia is a lightweight web application designed to visualize real-time and historical transportation data, such as traffic flows, transit schedules, or route usage, with clean dashboards and map overlays that help users and analysts interpret mobility patterns quickly. It integrates data streams from APIs, CSV feeds, or sensor inputs and processes them into intuitive visualizations including flow diagrams, heatmaps, time series charts, and route performance boards.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    SMTP Tunnel Proxy

    SMTP Tunnel Proxy

    A high-speed covert tunnel that disguises TCP traffic as SMTP email

    SMTP Tunnel Proxy is a high-speed covert tunneling proxy that disguises regular TCP traffic as legitimate SMTP email communication to evade deep packet inspection (DPI) firewalls and censorship systems. It implements a SOCKS5 proxy interface on the client that wraps outbound traffic into an SMTP-like handshake (EHLO, STARTTLS, AUTH) and encrypted payload, making the session appear to DPI systems as a normal email exchange.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    AWS VPC Terraform module

    AWS VPC Terraform module

    Terraform module which creates VPC resources on AWS

    ...This prevents the destruction of the VPC from releasing those IPs, while making it possible that a re-created VPC uses the same IPs. By default, if NAT Gateways are enabled, private subnets will be configured with routes for Internet traffic that point at the NAT Gateways configured by use of the above options. Since AWS Lambda functions allocate Elastic Network Interfaces in proportion to the traffic received, it can be useful to allocate a large private subnet for such allocations, while keeping the traffic they generate entirely internal to the VPC.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 16
    V2rayU

    V2rayU

    A tool to manage v2ray config json

    ...Freely change the transmission configuration. Upgrade command (keep the configuration file, if the upgrade fails, please install it completely). Call v2ray official api for traffic statistics. Multi-user, multi-port management , mixed transmission protocol management is no longer a dream. A random port will be generated during the first installation, the default configuration is mkcp + one random header camouflage; the configuration information will be displayed after the installation is complete. After the script runs, you can eat it with confidence! ...
    Downloads: 46 This Week
    Last Update:
    See Project
  • 17
    Xray Core

    Xray Core

    Xray, Penetrates Everything. Also the best v2ray-core

    Xray-core is an enhanced superset of v2ray-core, providing a high-performance privacy proxy framework supporting XTLS. It offers full compatibility with v2ray configs, supports multiple protocols, advanced routing, and is distributed as a single executable.
    Downloads: 216 This Week
    Last Update:
    See Project
  • 18
    OpenWrt PassWall

    OpenWrt PassWall

    OpenWRT plugin that provides proxy routing management

    openwrt-passwall is a comprehensive OpenWRT plugin that provides proxy routing management for internet traffic. It integrates with various tools and protocols like Shadowsocks, V2Ray, XRay, and Trojan to bypass censorship and optimize network performance. Designed for advanced users and network administrators, Passwall features a full-featured web UI and dynamic rules for routing and DNS control.
    Downloads: 193 This Week
    Last Update:
    See Project
  • 19
    Hysteria

    Hysteria

    Hysteria is a powerful, lightning fast and censorship resistant proxy

    Hysteria is a high-performance, censorship-resistant proxy and VPN-like networking tool designed to deliver fast, reliable connectivity over unstable or lossy networks by leveraging a custom UDP/QUIC-based transport layer that can masquerade as standard HTTP/3 traffic to evade detection. It supports a wide range of use cases including SOCKS5 and HTTP proxying, TCP/UDP forwarding, Linux TProxy for network redirection, and even tunneling via TUN interfaces, making it a flexible choice for developers and network engineers needing robust remote access or traffic obfuscation. Because it’s implemented in Go and MIT-licensed, the project provides cross-platform builds for major operating systems and architectures, letting users deploy servers and clients for both personal and infrastructural purposes.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 20
    Easegress

    Easegress

    A Cloud Native traffic orchestration system

    ...Easegress can be a typical seven-level API Gateway, it also can be a side-car to be a Service Mesh, and Easegress can perfectly work with other software to ship powerful features, such as: Kubernetes Ingress, Knaitve FaaS, and Eureka/Consul/Etcd/Nacos and so on. The Easegress can management the traffic and APIs, not only can do load balancing, canary development but also can aggregate and pipeline a number of APIs. This function automatically helps the website optimize its performance, such as: adding the cache, merging the requests, and reducing the network bandwidth. Sometimes, a site could have unexpectedly higher traffic, the Ease Gateway could help to protect the critical service for critical customers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    SSPanel-UIM

    SSPanel-UIM

    Multi-purpose proxy service management system

    SSPanel-UIM is a web interface and management platform for Shadowsocks (a secure SOCKS5 proxy tool often used to circumvent censorship). It supports multi-tenant accounts, traffic quotas, node management, coupon systems, invite codes, and payment gateways integration (for example, Stripe, PayPal, etc.). The platform includes features like user dashboards, usage graphs, IP/device logging, and automatic coupon or traffic renewal logic. Administrators can configure SSR/V2Ray or other proxy backends and synchronize them with the panel, so nodes apply updates or bans uniformly. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Istio

    Istio

    Connect, secure, control, and observe services

    Istio is an open platform for connecting, securing, and managing microservices. It provides a uniform way of integrating microservices, managing traffic flow, enforcing policies and aggregating telemetry data. With its diverse feature set you can successfully and efficiently run a distributed microservice architecture, overall reducing deployment complexity and easing the strain on development teams. Istio currently supports Kubernetes and Consul-based environments, with plans to support additional platforms in the near future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Proton VPN Windows App

    Proton VPN Windows App

    Official ProtonVPN Windows app

    ...It includes a modern GUI built with .NET and WPF that lets users authenticate, choose VPN servers, and configure features like split tunneling or kill switch, while a background Windows service manages VPN connections using the OpenVPN protocol and handles networking tasks such as firewall and adapter configuration. The app integrates a custom TAP driver and a split tunnel callout driver to help route traffic securely and prevent leaks, and is structured so the GUI and service components work together to deliver a smooth user experience on Windows desktops and laptops. ProtonVPN’s Windows client supports both free and paid users with access to Proton’s global server network, encrypted tunnels, and privacy-first policies that block logging and respect user anonymity.
    Downloads: 319 This Week
    Last Update:
    See Project
  • 24
    Setup IPsec VPN

    Setup IPsec VPN

    Scripts to build your own IPsec VPN server with IPsec/L2TP

    setup-ipsec-vpn is a set of automated scripts that allow you to deploy your own IPsec VPN server on Linux in just a few minutes. It supports multiple VPN protocols, including IPsec/L2TP, Cisco IPsec (XAuth), and IKEv2, providing strong encryption to protect network traffic. By encrypting all traffic between the client and server, the VPN prevents eavesdropping on unsecured networks such as public Wi-Fi in coffee shops, hotels, or airports. The project uses Libreswan as the IPsec server and xl2tpd as the L2TP provider, with additional options to install WireGuard or OpenVPN on the same host. It is designed for simplicity—requiring only a single command to set up, with randomly generated secure credentials created during installation. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 25
    Shadowsocks Rust

    Shadowsocks Rust

    A Rust port of shadowsocks

    Shadowsocks Rust is an open-source, high-performance implementation of the Shadowsocks secure proxy protocol written in Rust, designed to provide fast, encrypted SOCKS5-based tunneling to help users bypass network censorship and protect privacy. Shadowsocks itself is widely used to route internet traffic through an encrypted proxy, allowing secure access to blocked or restricted content while mitigating simple traffic-inspection techniques. By leveraging Rust, this implementation emphasizes memory safety, concurrency, and efficiency, making it suitable for both client and server use on devices ranging from small embedded systems to large servers. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next