Open Source Log Analysis Software - Page 19

Log Analysis Software

View 92 business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    This project contains the PERL scripts, which can rearrange the logs from /var/log/messages and insert in to the database. Scripts can also separate logs for each syslog clients as well as for each application of syslog client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Syslog Server for Windows

    Syslog Server for Windows

    Visual Syslog Server for Windows with a graphical user interface.

    Project moved here: https://sourceforge.net/projects/syslogserverwindows/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    receiving and analysing syslog messages sended from box's via udp. Is able to send the message to a MySQL Server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    TAXOMO
    Data mining tool for sequences (e.g. trajectories on a map, visited web pages, etc.) that creates a succinct description of the sequences, given a taxonomy (e.g. regions and sub-regions in the map, categories and sub-categories of pages, etc.).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 5
    this pcap based project is used for capture tcp session. it use a sizeable hash table to build a captured session table, and so can capture tcp session which begin with tcp syn or tcp syn+ack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    TCPIPTraff simply monitors the traffic of a network interface and generates a HTML output. You need perl, perl-DBI, mysql, apache, php
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    TISCONSREP - консольное приложение, позволяющее сформировать отчет по трафику, используя базы данных ПО Traffic Inspector (Трафик Инспектор).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    TRC - Traffic Counter is php-ajax based web-interface to analyse squid access.log. in MySQL database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A PHP script for parsing MRTG log files and displaying network traffic statistics. It can display total traffic, avg. rate, peak time and rate over a selectable period of time. We wish to later support RRD tool and maybe even more log formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 10
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A command line utility to display statistics about a text file consisting of lines of data. The statistics include counts of line terminator pairs (CR, LF, CR+LF) and line counts. Also shows if there is an unterminated trailing line.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A command line utility to read a text file containing lines of data, clean up any CR/LF anomalies, and output the lines of text with clean CR/LF terminators to standard output. The binary is a Windows 32 bit console app.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A Log Extraction Utility for owners of the Belkin 4-Port Cable/DSL Gateway Router (Model F5230).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A web server log file analyzer that combines extreme speed with high flexibility and scalability.Can produce XHTML output for viewing with a web browser. Supports standard CLF and combined (Apache), as well as W3C (IIS) logs format.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A tool to visualize interactively huge amounts of eventdata. Uses an innovative hierarchical zoomlens scaling from quarters down to 50 ms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The Titan Firewall is an interface Web to manage firewall based on Linux with iptables. It supports filtrate of packages, NAT, logs, VPN's... Implemented in Java and jsp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TrUp is a client for the Uptimes Project as started by Wonko for the TriangleOS (http://httpd.chello.nl/w.cools) written in ANSI C without any extra libraries. Supports protcol 5.0.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Track Attack is a system for analysing data contained in log files. Track Attack can process different types of log files in parallel so as to get a time-ordered view of how events unfolded.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Traffic Control is a Linux toolbox to control squid, NAT, and other services traffic limits. TF uses Linux iptables to count traffic. This utility consists of two parts. The first is server side (written in Perl) and the second part is the interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This project is a filter for Microsoft Internet Security and Acceleration Server with GUI tool for administrators, which provides a simple way for counting and limiting the amount of Internet traffic used by the local network users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Distributed and Hybrid Intrusion Detection and Response System
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This project was originally created to allow Technical Support personnel to troubleshoot problems with customers logging into their e-mail. It was written to work with VPOPMail when the VLOG, database logging feature, is turned ON.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This project is an web-based text log file processor written in Java for the analysis of log files produced by the MMORPG Vanguard: Saga of Heroes, but will expand to include other uses including other games and security log analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is an easy to install php add-on to osCommerce that provides you with on-line web stats about visitors to your web site. Information is stored in a MySQL database and displayed in a tabular Admin report with multiple dynamic and static charts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Visitors processes a Web log file, trying very hard to identify a single "person" as much as possible. This is typically achieved by the use of either an identifying cookie in the log file, or via the IP address, name, and browser ID combination.
    Downloads: 0 This Week
    Last Update:
    See Project