Denshi Goshin Jutsu

Learn the Art of Digital Self Defense

Start with the problem you are seeing, choose the right NetTools app, and follow a documented playbook from evidence to action.

Common operator problems

Start with the pain point

Pick the thing that is bothering you, then move into the app or playbook that solves it.

WireTuna

I do not know which app is talking to the internet.

Use WireTuna to connect Windows traffic to the app, destination, protocol, and packet evidence.

NetView

One device is suddenly louder than the rest of the network.

Use NetView to map IP nodes, MAC addresses, packet counts, and chatty source groups.

NetEye

The network feels slow, unstable, or hard to prove.

Use NetEye to measure latency, packet loss, jitter, uptime, and traceroute hop behavior.

HoneyMesh

Bots are scanning services or brute forcing exposed entry points.

Use HoneyMesh traps for behavior-based detection, then enforce with eBPF/XDP after allowlist review.

IronClad Vault

Sensitive files need encryption, clearance, and recovery discipline.

Use IronClad Vault for AES-256-GCM storage, classifications, RBAC, Sentinel, and Megakey recovery.

P2P Chat

Two trusted people need direct encrypted file exchange.

Use P2P Chat for host/client encrypted transfer with an out-of-band key and a bounded file folder.

Apps that solve the work

A simple tool map

Each app has one job in the defense workflow: see, map, diagnose, trap, protect, or exchange.

Application-aware visibility

WireTuna

WireTuna shows which Windows app is talking, where it is talking, which protocol is involved, and what the flow likely means.

Best when

You need to understand unknown Windows traffic

More info on WireTuna
Connection mapping

NetView

NetView captures packets on a selected adapter and draws a live graph of IP nodes, links, protocol colors, MAC addresses, and active connection groups.

Best when

You want a live visual map of adapter traffic

More info on NetView
Network health diagnostics

NetEye

NetEye helps operators measure connection health with live ping metrics and route analysis from a clean web interface.

Best when

Calls or streams are unstable

More info on NetEye
Mesh defense

HoneyMesh

HoneyMesh detects hostile activity with traps and analytics, can drop banned traffic at kernel speed with XDP/eBPF, and optionally shares signed intelligence with trusted Pro peers.

Best when

You need Linux-side detection and enforcement

More info on HoneyMesh
Data protection

IronClad Vault

IronClad Vault stores files locally with AES-256-GCM, Argon2id, a 1MB Megakey recovery file, role-based clearance, and Sentinel mode for remote client access.

Best when

You need encrypted local storage

More info on IronClad Vault
Secure exchange

P2P Chat

P2P Chat creates a direct encrypted connection between a host and client so they can exchange messages and files without third-party servers.

Best when

Two trusted parties need direct encrypted chat

More info on P2P Chat

Popular playbooks

Start with real operator problems

These guides are organized around what defenders actually see first.

Playbook

Unknown Process Talking To The Internet

Use WireTuna to identify the app, destination, protocol, meaning, and packet evidence before you decide whether to escalate.

Beginner8 minWireTuna
Open guide
Playbook

Map A Chatty Device

Use NetView's graph, MAC hover, source grouping, packet counts, IP search, and export tools to identify the device and preserve a snapshot.

Beginner7 minNetView
Open guide
Playbook

Diagnose A Bad Connection

Use NetEye continuous ping for latency, loss, jitter, and uptime, then traceroute to identify slow or timing-out hops.

Operator10 minNetEye
Open guide
Playbook

Bot Scans And Brute Force Attacks

Use HoneyMesh traps for Behavior-Based Detection, confirm JA4-first context, then escalate to Kernel-Level Blocking with eBPF/XDP only after allowlist review.

Advanced12 minHoneyMesh
Open guide

Guided incident wizard

Choose your problem

WireTuna

Start with WireTuna traffic evidence. Identify app, destination, protocol, meaning, volume, and packet details.

  1. Select the adapter
  2. Use Unknown Activity or protocol filters
  3. Open flow details
  4. Export packet rows if needed

Ask NetTools

Ask the ecosystem

Dojo progression

Level up from first lesson to black belt proof

Each path now has a belt ladder. Start with the basics, then build toward operator-level evidence, safe execution, and clear explanation.

Latest lessons

Guides, tips, and tactical notes

Publish practical answers first, then grow the archive around repeated user questions.

Learn

Network Visibility Fundamentals

Combine WireTuna app-level flows, NetView connection graphs, and NetEye health metrics into one visibility habit.

Beginner12 minWireTuna + NetView + NetEye
Open guide
Learn

WireTuna Traffic Analysis Without Panic

Use adapter selection, quick filters, flow details, packet rows, RDAP ownership, and Network Tools before deciding what matters.

Operator10 minWireTuna
Open guide
Tips

WireTuna Filters For Fast Triage

Start with Unknown Activity, protocol/search filters, needs review, and Back to Main View to reset focus.

Beginner5 minWireTuna
Open guide
Tips

NetView First Checks

Check graph nodes, protocol-colored links, MAC hover, source grouping, packet counts, IP search, and export.

Beginner6 minNetView
Open guide
Blog

What The NetTools Ecosystem Actually Is

A practical tour of visibility, diagnostics, mesh defense, secure storage, and direct encrypted exchange.

Beginner7 minWireTuna + NetView + NetEye + HoneyMesh + IronClad Vault + P2P Chat
Open guide
Blog

The First Five Signs Your Network Needs Better Visibility

Unknown app traffic, chatty graph nodes, missing MAC context, packet loss, jitter, and route uncertainty.

Beginner8 minWireTuna + NetView + NetEye
Open guide