Browse free open source Log Analysis software and projects below. Use the toggles on the left to filter open source Log Analysis software by OS, license, language, programming language, and project status.

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 1
    LightSquid is a LIGHT and FAST, web based squid proxy traffic analyser . analize access.log and generate per-user & per group report.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Octopussy: Log Management Solution

    Octopussy: Log Management Solution

    Log Management Solution

    Logs Analyzer, Alerter & Reporter with a Web Interface
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Universal IP-traffic collector. Can gather data from Cisco IP Accounting / ipcad, Mikrotik, NSG, Revolution routers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Bruteblock allows system administrators to block various bruteforce attacks on UNIX services. The program analyzes system logs and adds attacker's IP into IPFW table effectively blocking them. Addresses are removed from the table after expiration period
    Downloads: 0 This Week
    Last Update:
    See Project
  • Easy-to-use Business Software for the Waste Management Software Industry Icon
    Easy-to-use Business Software for the Waste Management Software Industry

    Increase efficiency, expedite accounts receivables, optimize routes, acquire new customers, & more!

    DOP Software’s mission is to streamline waste and recycling business’ processes by providing them with dynamic, comprehensive software and services that increase productivity and quality of performance.
    Learn More
  • 5
    Experimental Hybrid Intrusion Detection System written in Java
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This useful GUI script help you to monitoring you limit access to internet from GPRS, EDGE, UMTS and etc. It support three types of connection: limited , packet of traffic, unlimited.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Internet Control Firewall Intrusion Detection and Logger for Inbound and Outbound Traffic. Watches Files and Directories, Drive and Memory Protection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Screen Squid

    Screen Squid

    Log analyser for Squid access.log

    Screen squid is web-based interface for viewing reports based on Squid proxy server log files. It can be accessed from web-browser through more than 50 reports. No extra files, only DB. All reports generated "on-the-fly". And we got personal cabinet for each user/group.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Proxy-traffic manager. Defines bytelimit for each real user, and prevent them from downloading more than allowed. Provides friendly (Web) GUI for users and a singe manager. Only squid-proxy supported now!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 10
    Traffic Control is a Linux toolbox to control squid, NAT, and other services traffic limits. TF uses Linux iptables to count traffic. This utility consists of two parts. The first is server side (written in Perl) and the second part is the interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Web Traffic Analysis Software (or counter) supporting all known SQL databases (or XML). Easy install/upgrade, advanced user recognition technics, high usability.<p />Tracks users via: a) Server Logs, b) PHP inc., c)Web Beacons (JavaScript)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This program сonstantly reads the file(like "tail -f") and сompares every line with expression in file and executing some actions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Collector of the traffic on the basis of pcap-library. Data are aggregated and saved under the scheme "DetailHostMatrix Aggregation Schemes" Cisco NetFlow FlowCollector. Data are kept in the form of gzip-files or deduced in stdout.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Scripts written in php/mysql/bash aimed to provide control over volume of traffic downloaded with users through squid proxy server. Users are identified with ip addresses or computers names. Current version of squid-traffic contains an installer that sim
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Система учета трафика.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next