I do not know which app is talking to the internet.
Use WireTuna to connect Windows traffic to the app, destination, protocol, and packet evidence.
Denshi Goshin JutsuNetTools Defense AcademyDenshi Goshin Jutsu
Start with the problem you are seeing, choose the right NetTools app, and follow a documented playbook from evidence to action.
Common operator problems
Pick the thing that is bothering you, then move into the app or playbook that solves it.
Use WireTuna to connect Windows traffic to the app, destination, protocol, and packet evidence.
Use NetView to map IP nodes, MAC addresses, packet counts, and chatty source groups.
Use NetEye to measure latency, packet loss, jitter, uptime, and traceroute hop behavior.
Use HoneyMesh traps for behavior-based detection, then enforce with eBPF/XDP after allowlist review.
Use IronClad Vault for AES-256-GCM storage, classifications, RBAC, Sentinel, and Megakey recovery.
Use P2P Chat for host/client encrypted transfer with an out-of-band key and a bounded file folder.
Apps that solve the work
Each app has one job in the defense workflow: see, map, diagnose, trap, protect, or exchange.
WireTuna shows which Windows app is talking, where it is talking, which protocol is involved, and what the flow likely means.
You need to understand unknown Windows traffic
NetView captures packets on a selected adapter and draws a live graph of IP nodes, links, protocol colors, MAC addresses, and active connection groups.
You want a live visual map of adapter traffic
NetEye helps operators measure connection health with live ping metrics and route analysis from a clean web interface.
Calls or streams are unstable
HoneyMesh detects hostile activity with traps and analytics, can drop banned traffic at kernel speed with XDP/eBPF, and optionally shares signed intelligence with trusted Pro peers.
You need Linux-side detection and enforcement
IronClad Vault stores files locally with AES-256-GCM, Argon2id, a 1MB Megakey recovery file, role-based clearance, and Sentinel mode for remote client access.
You need encrypted local storage
P2P Chat creates a direct encrypted connection between a host and client so they can exchange messages and files without third-party servers.
Two trusted parties need direct encrypted chat
Popular playbooks
These guides are organized around what defenders actually see first.
Use WireTuna to identify the app, destination, protocol, meaning, and packet evidence before you decide whether to escalate.
Open guideUse NetView's graph, MAC hover, source grouping, packet counts, IP search, and export tools to identify the device and preserve a snapshot.
Open guideUse NetEye continuous ping for latency, loss, jitter, and uptime, then traceroute to identify slow or timing-out hops.
Open guideUse HoneyMesh traps for Behavior-Based Detection, confirm JA4-first context, then escalate to Kernel-Level Blocking with eBPF/XDP only after allowlist review.
Open guideGuided incident wizard
Start with WireTuna traffic evidence. Identify app, destination, protocol, meaning, volume, and packet details.
Ask NetTools
Dojo progression
Each path now has a belt ladder. Start with the basics, then build toward operator-level evidence, safe execution, and clear explanation.
Latest lessons
Publish practical answers first, then grow the archive around repeated user questions.
Combine WireTuna app-level flows, NetView connection graphs, and NetEye health metrics into one visibility habit.
Open guideUse adapter selection, quick filters, flow details, packet rows, RDAP ownership, and Network Tools before deciding what matters.
Open guideStart with Unknown Activity, protocol/search filters, needs review, and Back to Main View to reset focus.
Open guideCheck graph nodes, protocol-colored links, MAC hover, source grouping, packet counts, IP search, and export.
Open guideA practical tour of visibility, diagnostics, mesh defense, secure storage, and direct encrypted exchange.
Open guideUnknown app traffic, chatty graph nodes, missing MAC context, packet loss, jitter, and route uncertainty.
Open guide