[go: up one dir, main page]

Open Source Ruby Network Monitoring Software

Ruby Network Monitoring Software

View 334 business solutions

Browse free open source Ruby Network Monitoring Software and projects below. Use the toggles on the left to filter open source Ruby Network Monitoring Software by OS, license, language, programming language, and project status.

  • Relax: PRTG Monitors Your IT for You Icon
    Relax: PRTG Monitors Your IT for You

    Stay in control and avoid IT headaches. PRTG monitors your network, devices, and apps - receive alerts when it matters most.

    You’re the go-to IT person, always putting out fires and keeping things running. With PRTG, you get reliable alerts to monitor your entire IT infrastructure, without the noise. Our intuitive setup gives you a clear overview of your network, devices, and applications in real time. Get instant alerts only when something needs your attention, whether you’re at your desk or on the move. Spend less time worrying about outages and more time focusing on what matters. Set up PRTG once and let it work for you - PRTG has you covered.
    Start Your Free PRTG Trial Now
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
    Try for free
  • 1
    SIGAR (System Information Gatherer and Reporter) is a cross-platform, cross-language library and command-line tool for accessing operating system and hardware level information in Java, Perl and .NET.
    Downloads: 53 This Week
    Last Update:
    See Project
  • 2
    RogueScanner is a network security tool for automatically discovering rogue wireless access points by scanning a wired network. In addition to finding access points, it will classify all discovered network devices
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Aaron is an application, service, and network availability monitoring and alert daemon. Notification of unavailable services, networks, etc., levels is sent to the appropriate roles. Aaron is highly customizable enterprise class monitoring software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    In digital visual effects we deal with an overwhelming number of images. Earth simplifies the management of this data by continuously tracking the whereabouts of image sequences across a filesystem or visual effects facility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
    Try for free
  • 5
    Insidias is a next-generation intrusion detection engine, with a focus on speed, efficiency, advanced pattern matching, parallel-processing, modularity, and expandability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Lucie enables parallel network installation of large numbers of nodes from one single administration server. It is designed to be scalable and efficient, so a complete Linux cluster can be built from scratch in a short amount of time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Mila Ajax Map is an AJAX web application that may be used with a Web browser to display a network map with monitoring fuctions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A Network Management framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Security analysis tools produced by The Ohio State University Network Security Group.
    Downloads: 0 This Week
    Last Update:
    See Project
  • The All-in-One Commerce Platform for Businesses - Shopify Icon
    The All-in-One Commerce Platform for Businesses - Shopify

    Shopify offers plans for anyone that wants to sell products online and build an ecommerce store, small to mid-sized businesses as well as enterprise

    Shopify is a leading all-in-one commerce platform that enables businesses to start, build, and grow their online and physical stores. It offers tools to create customized websites, manage inventory, process payments, and sell across multiple channels including online, in-person, wholesale, and global markets. The platform includes integrated marketing tools, analytics, and customer engagement features to help merchants reach and retain customers. Shopify supports thousands of third-party apps and offers developer-friendly APIs for custom solutions. With world-class checkout technology, Shopify powers over 150 million high-intent shoppers worldwide. Its reliable, scalable infrastructure ensures fast performance and seamless operations at any business size.
    Learn More
  • 10
    A Lightweight P2P Threat Analysis Bus
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    RC-EXPLOITER

    RC-EXPLOITER

    Brute-forcing WAN/LAN services

    The author does not hold any responsibility about the bad use of this script remember that attacking targets without prior consent is illegal and punish by law, this script as build to show how msf resource files can automated tasks. Scanning WAN networks In search of targets may take 10 to 15 minutes depending of your network connection, and will search In 1024 random hosts For the selected service/port, also the File 'brute.txt' may be edited to insert new entrys, or we can provide the full path to another dicionary File to be used In brute-forcing services. Additional tool settings can be configured just by editing 'settings' file (nano settings) before running the tool, settings like: use decoys (scanning WAN networks) OR spoof mac address (change mac address and ip address), can only be config before running the tool. (so the tool can use this settings to work).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    RInject is a tool for automated testing of web applications and services. It can be used to test HTTP(S) interfaces for service-level monitoring. Compared to WebInject, RInject has a more powerful verification- and parsing-engine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This library provides a Ruby interface to Nmap's scan data. This information is presented in an easy-to-use and intuitive fashion for storage and manipulation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Ruby interface for libpcap packet capture library
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A system monitoring application using Ruby on Rails and based on SNMP. OpenSource Project with GPL V3 Liscence
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Scotty TNG is a ping/snmp based realtime network monitoring software. This software implements a client/server approach to monitor a huge number of hosts with ICMP echo requests and SNMP queries. The client presents all gathered informations via a GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Squid Log Analyzer and Report Generator.
    Leader badge">
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Tattoo will provide a set of command-line scripts for analyzing raw tcpdump files or ASCII hexadecimal representations of network traffic to identify format, function, and communication model.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A software distribution based on Debian/Linux to provide network diagnostics, security monitoring and intrusion detection. The distribution can be easily installed by office personnell.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    GNMS is a GPL Network Management System, a graphical tool used to monitor state of network elements. Montoring can be done in multiple ways using service discovery, snmp, wmi and custom plugins, moreover syslog and snmp traps can be caught too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    jECTS is a JAVA project that focuses on some of the aspects of ECTS (= European Credit Transfer System). Mainly the translation of local grades into ECTS grades and the generation of a ToR (Transcript of Records).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    Operative Systems Suported are: Linux-ubuntu, kali-linux, backtack-linux (un-continued), freeBSD, Mac osx (un-continued) Netool its a toolkit written using 'bash, python, ruby' that allows you to automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic, Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan networks, TCP/UDP packet manipulation using etter-filters, and gives you the ability to capture pictures of target webbrowser surfing (driftnet), also uses macchanger to decoy scans changing the mac address. Rootsector module allows you to automate some attacks over DNS_SPOOF + MitM (phishing - social engineering) using metasploit, apache2 and ettercap frameworks. Like the generation of payloads, shellcode, backdoors delivered using dns_spoof and MitM method to redirect a target to your phishing webpage. recent as introducted the scanner inurlbr (by cleiton)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Rails Pig is Ruby on Rails based Analyst frontend to a Snort-MySQL database. It will be a web only console, lightly sprinkled with AJAX in order to provide near-real time event updates without annoying and slow full page refresh.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Paglo Crawler discovers all devices connected to a network - including workstations, servers, switches, routers, printers, etc and gathers rich information about each device. This information is then searchable through an account at http://paglo.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next