Open Source Mac Networking Software - Page 5

Networking Software for Mac

View 81 business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    NetworkX

    NetworkX

    Network analysis in Python

    NetworkX is a Python package for the creation, manipulation, and study of the structure, dynamics, and functions of complex networks. Data structures for graphs, digraphs, and multigraphs. Many standard graph algorithms. Network structure and analysis measures. Generators for classic graphs, random graphs, and synthetic networks. Nodes can be "anything" (e.g., text, images, XML records). Edges can hold arbitrary data (e.g., weights, time-series). Open source 3-clause BSD license. Well tested with over 90% code coverage. Additional benefits from Python include fast prototyping, easy to teach, and multi-platform. Find the shortest path between two nodes in an undirected graph. Python’s None object is not allowed to be used as a node. It determines whether optional function arguments have been assigned in many functions. And it can be used as a sentinel object meaning “not a node”.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    Osquery

    Osquery

    SQL operating system instrumentation and monitoring framework

    Osquery is an operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD. The tools make low-level operating system analytics and monitoring both performant and intuitive. Osquery exposes an operating system as a high-performance relational database. This allows you to write SQL queries to explore operating system data. With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes.Osquery queries your devices like a database. Osquery uses basic SQL commands to leverage a relational data-model to describe a device. Frequently, attackers will leave a malicious process running but delete the original binary on disk. This query returns any process whose original binary has been deleted, which could be an indicator of a suspicious process.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    Prometheus SNMP Exporter

    Prometheus SNMP Exporter

    SNMP Exporter for Prometheus

    This exporter is the recommended way to expose SNMP data in a format that Prometheus can ingest. To simply get started, it's recommended to use the if_mib module with switches, access points, or routers using the public_v2 auth module, which should be a read-only access community on the target device. Note, that community strings in SNMP are not considered secrets, as they are sent unencrypted in SNMP v1 and v2c. For secure access, SNMP v3 is required.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Roxy-WI

    Roxy-WI

    Web interface for managing Haproxy, Nginx, Apache and Keepalived

    For those who need a convenient interface for managing all services in one place. Roxy-WI was created for people who want to have a fault-tolerant infrastructure, but do not want to plunge deep into the details of setting up and creating a cluster based on HAProxy, NGINX, Apache, and Keepalived. Use Roxy-WI to build a high available cluster for a couple of clicks: install HAProxy, NGINX, Apache, Keepalived, and its exporters, and carry out the initial configuration for the services. Collect download statistics in one place. Choose one of the three available monitoring options or use them all. If there are any problems, you will be informed immediately.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Traefik

    Traefik

    An open-source reverse proxy and load balancer

    Traefik (pronounced traffic) is a modern HTTP reverse proxy and load balancer that makes deploying microservices easy. Traefik integrates with your existing infrastructure components (Docker, Swarm mode, Kubernetes, Marathon, Consul, Etcd, Rancher, Amazon ECS, ...) and configures itself automatically and dynamically. Pointing Traefik at your orchestrator should be the only configuration step you need.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    i2pd

    i2pd

    I2P: End-to-End encrypted and anonymous Internet

    i2pd (I2P Daemon) is a lightweight, full-featured C++ implementation of the I2P (Invisible Internet Project) protocol, designed for enabling anonymous, encrypted, and censorship-resistant communication. It functions as a router node in the I2P network, supporting services like anonymous websites (eepsites), email, file sharing, and secure messaging. i2pd is designed to be resource-efficient and suitable for running on embedded systems or routers while maintaining compatibility with the wider I2P ecosystem.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    Siproxd is a proxy/masquerading daemon for the SIP protocol. It allows SIP clients (softphones & hardphones) to work behind an IP masquerading firewall or router.
    Leader badge
    Downloads: 43 This Week
    Last Update:
    See Project
  • 8
    Live Raizo - Linux for Virtual SysAdmin

    Live Raizo - Linux for Virtual SysAdmin

    Environment to experiment the system on simulated and real networks

    - Live Raizo is a linux distribution based on Debian 13 (Trixie) to experiment the system administration on simulated networks and real devices. - GNS3 is the gui used to manipulate the simulators/emulators of networks and systems like QEmu, Docker, Dynamips. - With this GNS3, you can clone as many times as you want the templates of virtual linux machines named "Debian" and "DDebian" that contain many network tools and services. - The prompt and the output of several linux commands are colored to highlight the main informations and to be more userfriendly. - Live Raizo also includes tools to interact with real devices : minicom, putty, Wireshark, as well as DHCP, DNS, FTP, TFTP, HTTP and SSH servers. Services are not started automatically. - It is used by the CFA UTEC of CCI in Seine et Marne in France for networking and Linux administration classes. - You can also open issues here : https://github.com/Raizo62/LiveRaizo Last 64 bits Release : v17.26.01.25i
    Leader badge
    Downloads: 37 This Week
    Last Update:
    See Project
  • 9
    nagiosgraph
    nagiosgraph parses output and performance data from Nagios plugins, stores the data in RRD files, and creates graphs and reports from the data. Graphs and reports can be embedded in Nagios. Easy to setup, highly customizable, and few dependencies.
    Leader badge
    Downloads: 27 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    Interlocking system for modular model railroading. The goal is the development of hard- and software for an model interlocking interfacing on the one hand to the model railroad and on the other to the model of the userinterface of an real interlocking.
    Leader badge
    Downloads: 136 This Week
    Last Update:
    See Project
  • 11

    Netdisco

    Full-featured enterprise network management tool

    Netdisco is an SNMP-based L2/L3 network management tool designed for moderate to large networks. Routers and switches are polled to log IP and MAC addresses and map them to switch ports. Automatic L2 network topology discovery, display, and inventory.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 12
    Arkime

    Arkime

    A full packet capturing, indexing, and database system

    Arkime is an open source, large-scale, full packet capturing, indexing, and database system designed to augment existing security infrastructure by storing and indexing network traffic in standard PCAP format. It offers full network visibility, facilitating the swift identification and resolution of security and network issues. Security teams gain access to the necessary network visibility data essential for responding to and investigating incidents to expose the full attack scope. Designed to be deployed across multiple clustered systems, Arkime provides the ability to scale to hundreds of gigabits per second. It allows security analysts to respond, reconstruct, investigate, and confirm information about the threats within your network, enabling appropriate responses quickly and precisely. As an open-source platform, Arkime provides users with the benefits of transparency, cost-effectiveness, flexibility, and community support.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 13
    FancySS

    FancySS

    fancyss is a project for bypassing the Great Firewall (GFW)

    Fancyss is a “scientific Internet access / bypassing censorship” toolkit targeted principally to Asus routers running AsusWRT or Merlin-based firmware. The project provides a plugin suite (with “software center” integration) so that home routers can run proxy or tunneling tools (e.g. V2Ray) to circumvent firewall or censorship (“GFW” in the Chinese context). Because it integrates into the router’s firmware environment, fancyss automates configuration, routing, and firewall rules to minimize manual tinkering. It supports multiple architectures and firmware versions, though some submodules or variants (e.g. “fancyss_hnd”) are optimized for specific chipsets. The project also maintains offline packages for constrained environments and hardware support lists. Many users adopt fancyss to turn relatively cheap consumer routers into censorship-resilient gateways, avoiding separate proxy appliances.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14
    Grafana Alloy

    Grafana Alloy

    OpenTelemetry Collector distribution with programmable pipelines

    Grafana Alloy is an open source OpenTelemetry Collector distribution with built-in Prometheus pipelines and support for metrics, logs, traces, and profiles. Grafana Alloy is Grafana Labs’ distribution of the OpenTelemetry Collector. It is an OTLP-compatible collector with built-in Prometheus optimizations that also support signals across metrics, logs, traces, and profiles. Alloy was started at Grafana Labs and announced at GrafanaCON in 2024. The mission of the project is to create the best “big tent” collector that’s compatible with the most popular open-source observability ecosystems and includes enterprise-grade features to simplify operating at scale in a modern cloud-native infrastructure.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    Scapy

    Scapy

    Scapy is a Python-based interactive packet manipulation program

    Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow fast packet prototyping by using default values that work. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, wireshark, p0f, etc.). It also performs very well at a lot of other specific tasks that most other tools can't handle, like sending invalid frames, injecting your own 802.11 frames, combining techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected channel, ...), etc. Scapy supports Python 2.7 and Python 3 (3.4 to 3.7). It's intended to be cross platform, and runs on many different platforms (Linux, OSX, *BSD, and Window
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    WatchYourLAN

    WatchYourLAN

    Lightweight network IP scanner

    WatchYourLAN is a local network monitoring tool that displays connected devices, providing insight into network activity and device status.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    BlueCove is a JSR-82 implementation on Java Standard Edition (J2SE) on BlueZ Linux, Mac OS X, WIDCOMM, BlueSoleil and Microsoft Bluetooth stack on WinXPsp2 and newer. Originally developed by Intel Research and currently maintained by volunteers.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 18
    ModSecurity is a web application firewall that can work either embedded or as a reverse proxy. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 19
    CrowdSec

    CrowdSec

    Firewall able to analyze visitor behavior & provide adapted response

    CrowdSec - an open-source massively multiplayer firewall able to analyze visitor behavior & provide an adapted response to all kinds of attacks. It also leverages the crowd power to generate a global IP reputation database to protect the user network. Crowdsec shouldn't, and didn't crash any production so far we know, but some features might be missing or undergo evolutions. IP Blocklists are limited to very-safe-to-ban IPs only (~5% of the global database so far, will grow soon). A modern behavior detection system, written in Go. It stacks on Fail2ban's philosophy, but uses Grok patterns & YAML grammar to analyse logs, a modern decoupled approach (detect here, remedy there) for Cloud/Containers/VM based infrastructures. Once detected you can remedy threats with various bouncers (block, 403, Captchas, etc.) and blocked IPs are shared among all users to further improve their security. Crowdsec is an open-source, lightweight software, detecting peers with aggressive behaviors.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    Nvitop

    Nvitop

    An interactive NVIDIA-GPU process viewer and beyond

    nvitop is an interactive NVIDIA device and process monitoring tool. It has a colorful and informative interface that continuously updates the status of the devices and processes. As a resource monitor, it includes many features and options, such as tree-view, environment variable viewing, process filtering, process metrics monitoring, etc. Beyond that, the package also ships a CUDA device selection tool nvisel for deep learning researchers. It also provides handy APIs that allow developers to write their own monitoring tools.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Sentry

    Sentry

    Cross-platform application monitoring and error tracking software

    Sentry is a cross-platform, self-hosted error monitoring solution that helps software teams discover, monitor and fix errors in real-time. The most users and logs will have to provide are the clues, and Sentry provides the answers. Sentry offers enhanced application performance monitoring through information-laden stack traces. It lets you build better software faster and more efficiently by showing you all issues in one place and providing the trail of events that lead to errors. It also provides real-time monitoring and data visualization through dashboards. Sentry’s server is in Python, but its API enables for sending events from any language, in any application. More than fifty-thousand companies already ship better software faster thanks to Sentry; let yours be one of them!
    Downloads: 4 This Week
    Last Update:
    See Project
  • 22
    Tengine

    Tengine

    A distribution of Nginx with some advanced features

    Tengine is a web server originated by Taobao, the largest e-commerce website in Asia. It is based on the Nginx HTTP server and has many advanced features. Tengine has proven to be very stable and efficient on some of the top 100 websites in the world, including taobao.com and tmall.com. Tengine has been an open source project since December 2011. It is being actively developed by the Tengine team, whose core members are from Taobao, Sogou and other Internet companies. Tengine is a community effort and everyone is encouraged to get involved. All features of nginx-1.18.0 are inherited, i.e., it is 100% compatible with nginx. Support the CONNECT HTTP method for forward proxy. Support asynchronous OpenSSL, using hardware such as QAT for HTTPS acceleration. Enhanced operations monitoring, such as asynchronous log & rollback, DNS caching, memory usage, etc. Support server_name in Stream module. More load balancing methods, e.g., consistent hashing, and session persistence.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 23
    Tsunami

    Tsunami

    Network security scanner for detecting severity vulnerabilities

    Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. When security vulnerabilities or misconfigurations are actively exploited by attackers, organizations need to react quickly in order to protect potentially vulnerable assets. As attackers increasingly invest in automation, the time window to react to a newly released, high severity vulnerability is usually measured in hours. This poses a significant challenge for large organizations with thousands or even millions of internet-connected systems. In such hyperscale environments, security vulnerabilities must be detected and ideally remediated in a fully automated fashion. To do so, information security teams need to have the ability to implement and roll out detectors for novel security issues at scale in a very short amount of time. Furthermore, it is important that the detection quality is consistently very high.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 24
    bmon

    bmon

    Bandwidth monitor and rate estimator

    bmon (Bandwidth Monitor) is a command-line network monitoring tool that provides detailed bandwidth statistics for network interfaces.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    go-libp2p

    go-libp2p

    libp2p implementation in Go

    go-libp2p is the official Go implementation of the libp2p networking stack, a modular and extensible framework for peer-to-peer communication. Used in systems like IPFS and Filecoin, go-libp2p abstracts away the complexity of building decentralized networks by handling discovery, transport, security, and multiplexing layers. Its modular architecture allows developers to customize network behavior while maintaining interoperability with other libp2p implementations. It empowers developers to build robust and scalable P2P applications across a variety of use cases.
    Downloads: 4 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB