[go: up one dir, main page]

Search Results for "network discovery visualisation"

Showing 216 open source projects for "network discovery visualisation"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Create a personalized AI chatbot for each team in minutes Icon
    Create a personalized AI chatbot for each team in minutes

    Get better, faster answers for your whole team with an AI chatbot trained on your company documents.

    QueryPal is the lifeline your team needs. Our AI chatbot integrates seamlessly with your communication channels, using advanced language understanding to identify and auto-answer repetitive questions — in seconds.
    Learn More
  • 1
    Materials Discovery: GNoME

    Materials Discovery: GNoME

    AI discovers 520000 stable inorganic crystal structures for research

    Materials Discovery (GNoME) is a large-scale research initiative by Google DeepMind focused on applying graph neural networks to accelerate the discovery of stable inorganic crystal materials. The project centers on Graph Networks for Materials Exploration (GNoME), a message-passing neural network architecture trained on density functional theory (DFT) data to predict material stability and energy formation.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Fapro

    Fapro

    Fake Protocol Server

    Fapro is an open-source asset discovery and vulnerability scanning tool developed by Fofa Pro. It assists in identifying and managing network assets, detecting potential vulnerabilities, and enhancing overall security posture
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    OWASP Amass

    OWASP Amass

    In-depth attack surface mapping and asset discovery

    The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and perform external asset discovery using open source information gathering and active reconnaissance techniques. The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. All of our projects ,tools, documents, forums, and chapters are free and open to anyone interested in improving application security. ...
    Downloads: 25 This Week
    Last Update:
    See Project
  • 4
    P2P Remote Desktop

    P2P Remote Desktop

    P2P Remote Desktop - Portable, No Configuration or Installation Needed

    p2p is a simple and educational peer-to-peer communication framework that demonstrates how devices can discover, connect, and exchange data directly without a central server. Built in C#, this project provides an easy-to-understand foundation for P2P networking, including peer discovery, messaging, and connection management. It’s particularly useful for learners and developers exploring decentralized communication or building the groundwork for P2P applications like chat systems or...
    Downloads: 16 This Week
    Last Update:
    See Project
  • Get to know our award-winning HR software. Icon
    Get to know our award-winning HR software.

    HR software with heart.

    BambooHR is all-in-one HR software made for small and medium businesses and the people who work in them—like you. Our software makes it easy to collect, maintain, and analyze your people data, improve the way you hire talent, onboard new employees, manage compensation, and develop your company culture. It’s designed to set you free to focus on what matters most—your people.
    Try it Free
  • 5
    Zapret

    Zapret

    Advanced open source tool for bypassing DPI-based censorship

    Zapret is an open source, cross-platform tool designed to help users bypass and evade Deep Packet Inspection (DPI)-based traffic blocking and censorship systems. Rather than acting as a traditional proxy or VPN, it works by manipulating network packets and traffic streams locally to confuse or disrupt DPI mechanisms used by ISPs and network filters, making it possible to access restricted websites and services without relaying traffic through third-party servers. Zapret implements multiple...
    Downloads: 1,131 This Week
    Last Update:
    See Project
  • 6
    XRAY

    XRAY

    XRay for recon, mapping and OSINT gathering from public networks

    XRAY is a modular security toolset that helps developers and security professionals analyze, fuzz, and test web applications, protocols, and network services for vulnerabilities. It provides a framework for writing and executing inspection modules that can parse structured data (JSON, XML, HTML), traverse graphs of endpoints, and perform intelligent probing guided by discovered surface area. XRay is typically used as a reconnaissance and vulnerability discovery engine in red-team or app-security workflows: it leverages extensible plugins to adapt to different protocols, inject payloads, and detect common bug classes such as injection flaws, misconfigurations, and unsafe endpoints. ...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 7
    i2pd

    i2pd

    I2P: End-to-End encrypted and anonymous Internet

    i2pd (I2P Daemon) is a lightweight, full-featured C++ implementation of the I2P (Invisible Internet Project) protocol, designed for enabling anonymous, encrypted, and censorship-resistant communication. It functions as a router node in the I2P network, supporting services like anonymous websites (eepsites), email, file sharing, and secure messaging. i2pd is designed to be resource-efficient and suitable for running on embedded systems or routers while maintaining compatibility with the wider...
    Downloads: 40 This Week
    Last Update:
    See Project
  • 8
    Volatility

    Volatility

    An advanced memory forensics framework

    Volatility is a widely used open-source framework for analyzing memory captures (RAM dumps) from Windows, Linux, and macOS systems. It enables investigators and malware analysts to extract process lists, network connections, DLLs, strings, artifacts, and more. Volatility supports many plugins for detecting hidden processes, malware, rootkits, and event tracing. It’s essential in digital forensics and incident response workflows.
    Downloads: 72 This Week
    Last Update:
    See Project
  • 9
    Sideband

    Sideband

    LXMF client for Android, Linux and macOS to communicate with people

    ...It emphasizes metadata resistance and secure message delivery, working effectively in offline, low-bandwidth, or disaster recovery scenarios. Built-in Rust, Sideband supports encrypted group messaging, file transfers, and network self-discovery. It is ideal for use in community networks, crisis response, and decentralized communications infrastructure.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Loan business software for any kind of loan Icon
    Loan business software for any kind of loan

    For established lenders, loan-granting scaleups and credit startups.

    CreditOnline is an end-to-end integrated loan business management platform helping organizations connect and integrate all relevant parties in a state-of-art lending ecosystem that supports any kind of loan or lending segment. Our future-proof lending technology and partnerships render it simple, fast and cost-effective to expand the portfolio of your services and number of your clients, allowing your business to scale up or reinvigorate itself effectively at any stage of the business life-cycle.
    Learn More
  • 10
    go-libp2p

    go-libp2p

    libp2p implementation in Go

    go-libp2p is the official Go implementation of the libp2p networking stack, a modular and extensible framework for peer-to-peer communication. Used in systems like IPFS and Filecoin, go-libp2p abstracts away the complexity of building decentralized networks by handling discovery, transport, security, and multiplexing layers. Its modular architecture allows developers to customize network behavior while maintaining interoperability with other libp2p implementations. It empowers developers to build robust and scalable P2P applications across a variety of use cases.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Prometheus

    Prometheus

    Open source monitoring system and time series database

    Prometheus is a leading open source systems and service monitoring solution. It works by collecting metrics from configured targets at given intervals, evaluating rule expressions, and then displaying the results. It can also signal an alert if a condition is observed to be true. What sets Prometheus apart from other monitoring systems is its highly dimensional data model, powerful query language, autonomous single server nodes, among many other distinguishing features. It also offers...
    Downloads: 78 This Week
    Last Update:
    See Project
  • 12
    Tribler

    Tribler

    Privacy enhanced BitTorrent client with P2P content discovery

    Tribler is a decentralized, privacy-enhanced BitTorrent client developed by researchers at Delft University of Technology. It introduces built-in anonymity using a Tor-like onion routing network and integrates its own blockchain for economic incentives and trust management. Tribler supports standard torrenting features along with distributed search, self-contained channels, and peer reputation. Its goal is to provide a fully autonomous file-sharing network without relying on external...
    Downloads: 68 This Week
    Last Update:
    See Project
  • 13
    NVIDIA GPU Exporter

    NVIDIA GPU Exporter

    Nvidia GPU exporter for prometheus using nvidia-smi binary

    Nvidia GPU exporter for prometheus, using nvidia-smi binary to gather metrics. There are many Nvidia GPU exporters out there however they have problems such as not being maintained, not providing pre-built binaries, having a dependency to Linux and/or Docker, targeting enterprise setups (DCGM) and so on.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 14
    s2n-quic

    s2n-quic

    An implementation of the IETF QUIC protocol

    ...This library integrates with AWS’s s2n-tls or rustls for the TLS 1.3 handshake and leverages Rust’s memory and thread safety guarantees to deliver a robust implementation. It is built with configurability in mind—you can tune congestion control (like CUBIC), pacing, packet size discovery, and other advanced network behaviors. Extensive testing (unit, fuzz, interop) ensures protocol compliance and interoperability with other implementations. Because it is open-source under Apache 2.0, organizations can integrate it into services where low latency, multiple streams, or mobility (connection migration) matter.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Spacemesh

    Spacemesh

    Go Implementation of the Spacemesh protocol full node

    Go-Spacemesh is the official Go implementation of the Spacemesh protocol, a novel blockchain based on Proof of Space-Time (PoST) designed for fair mining and energy efficiency. Unlike Proof of Work, PoST leverages unused hard drive space to secure the network, enabling anyone with a computer to participate without specialized hardware. Spacemesh introduces a mesh-based block DAG (Directed Acyclic Graph) structure for scalable and parallel consensus. The project aims to build a decentralized,...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 16
    Scapy

    Scapy

    Scapy is a Python-based interactive packet manipulation program

    ...It is designed to allow fast packet prototyping by using default values that work. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, wireshark, p0f, etc.). It also performs very well at a lot of other specific tasks that most other tools can't handle, like sending invalid frames, injecting your own 802.11 frames, combining techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected channel, ...), etc. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    Klavis AI

    Klavis AI

    MCP integration platforms for AI agents to use tools at any scale

    Klavis AI is a Y Combinator X25-backed open-source infrastructure platform that enables AI agents to reliably connect with external tools and services at scale through Model Context Protocol (MCP). Founded by ex-Google DeepMind and ex-Lyft engineers, Klavis provides 50+ production-ready MCP servers with enterprise OAuth support for GitHub, Slack, Gmail, Salesforce, Linear, Notion, and more. The flagship product Strata solves tool overload through progressive discovery, achieving +13% higher...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18

    Network Enumeration Tool

    Network Enumeration Tool for Host Exploration and Recon

    N-ETHER (Network Enumeration Tool for Host Exploration and Reconnaissance) is a robust and highly automated Python script designed to streamline the critical initial phases of network security auditing and penetration testing. It’s core purpose is to perform fast, comprehensive, and consistent host and port discovery across single targets or large lists of IP addresses.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 19
    PiliPlus

    PiliPlus

    PiliPlus

    ...The project structure favors modularity so that network requests, parsing, and presentation layers remain separable and testable. Its community-driven approach encourages rapid iteration on UI details and playback features while maintaining a familiar, mobile-native feel.
    Downloads: 115 This Week
    Last Update:
    See Project
  • 20
    cunicu

    cunicu

    A zeroconf peer-to-peer mesh VPN using Wireguard

    cunīcu is a user-space daemon managing WireGuard interfaces to establish a mesh of peer-to-peer VPN connections in harsh network environments. To achieve this, cunīcu utilizes a signaling layer to exchange peer information such as public encryption keys, hostname, advertised networks, and reachability information to automate the configuration of the networking links. From a user perspective, cunīcu alleviates the need of manual configuration such as exchange of public keys, IP addresses,...
    Downloads: 38 This Week
    Last Update:
    See Project
  • 21
    RustDesk Server Program

    RustDesk Server Program

    Self-host your own RustDesk server

    rustdesk-server is the self-hosted backend for RustDesk, an open-source remote desktop solution. It provides the rendezvous and relay components that allow RustDesk clients to discover peers and traverse NATs securely, enabling direct or relayed connections when needed. By running your own server, you retain control over connection metadata and can operate entirely within your organization’s perimeter. The project targets simplicity of deployment while maintaining performance characteristics...
    Downloads: 19 This Week
    Last Update:
    See Project
  • 22
    PentestAgent

    PentestAgent

    AI agent framework for black-box security testing

    PentestAgent is an open-source autonomous security testing platform designed to help organizations identify vulnerabilities and assess security posture by simulating real-world attack scenarios without manual intervention. It brings a modular and automated approach to penetration testing by orchestrating a suite of tools and scripts that can emulate common exploitation techniques, reconnaissance workflows, and post-exploitation activities across targets. Users configure rules, policies, and...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 23
    guide-rpc-framework

    guide-rpc-framework

    A custom RPC framework implemented by Netty+Kyro+Zookeeper

    The guide-rpc-framework is a Java implementation of a Remote Procedure Call (RPC) framework built on Netty, Kyro (for serialization), and Zookeeper (for service discovery and coordination). It’s aimed primarily at learners and practitioners of distributed systems who want to see how you might build an RPC system from first principles rather than just use an existing library. The project provides code for client-side stubs, server-side skeletons, method dispatching, serialization, load...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Hypermind

    Hypermind

    The high-availability solution to a problem that doesn't exist

    Hypermind is a whimsical yet technically intriguing decentralized application that combines a peer-to-peer (P2P) network counter with ephemeral chat functionality, built to “solve” the meta-problem of tracking how many peers are running its container in a decentralized mesh. There’s no central server or database; instead, Hypermind leverages a Distributed Hash Table (DHT) using Hyperswarm to discover peers and maintain approximate counts of active nodes, architected to be a fully...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    PortKiller

    PortKiller

    A powerful cross-platform port management tool for developers

    PortKiller is a cross-platform port management tool for developers that makes it easy to monitor network ports, manage Kubernetes port forward sessions, integrate Cloudflare Tunnels, and kill processes using a friendly UI. It auto-discovers all listening TCP ports on your machine, lets you filter and search through them, and provides one-click graceful or forceful termination of processes holding those ports. Beyond basic port listing, PortKiller includes Kubernetes port-forward session...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next