PiStats
Network monitor
An app for monitoring Pi-hole network settings and controlling its functionality on macOS
macOS app to visualize Pi-hole information
372 stars
12 watching
12 forks
Language: Swift
last commit: 3 months ago
Linked from 1 awesome list
macospi-holeswiftswiftui
Related projects:
Repository | Description | Stars |
---|---|---|
thinkst/canarytokens | A tool for tracking network activity and actions. | 1,754 |
travisfsmith/sweetsecurity | A toolset for setting up and managing network security monitoring systems on Raspberry Pi-like devices. | 779 |
toni-moreno/snmpcollector | A tool to collect and store network device data in a time-series format | 289 |
beltex/dshb | A macOS system monitor written in Swift that displays live system statistics | 473 |
vesche/histstat | A tool to monitor and display network connections in real-time with additional information such as time of connection and user details. | 98 |
inket/stts | A macOS app for monitoring cloud services and their status updates | 530 |
opennms/opennms | A comprehensive network monitoring platform with data collection, traffic management, and configuration options. | 976 |
tchoutri/nvjorn | A network services monitor written in Elixir using Poolboy. | 16 |
bonzaithepenguin/loading | Displays a spinning progress wheel in the menu bar to indicate network activity | 612 |
brotandgames/ciao | Monitors HTTP(S) URL endpoints and sends notifications on status changes. | 1,867 |
initialstate/pi-process-dashboard | Remotely monitor Raspberry Pi processes and IP addresses to ensure continuous operation of tasks. | 288 |
mosajjal/dnsmonster | A toolkit for monitoring and analyzing DNS traffic to help security teams understand an organization's DNS activity | 317 |
ntop/ntopng | A web-based application for monitoring and analyzing network traffic in real-time. | 6,277 |
stamusnetworks/selks | An integrated security monitoring platform using Suricata and Elasticsearch to analyze network traffic and alerts | 1,479 |
pjlantz/hale | A tool for monitoring and analyzing command & control networks of botnets | 186 |