Apps
Meet the NetTools ecosystem
Each app profile is grounded in the supplied manuals: Windows visibility, connection mapping, network health diagnostics, HoneyMesh defense, local-first vaulting, and encrypted peer-to-peer transfer.
Application-aware visibility
WireTuna
Live Traffic SensemakingWindows desktop, .NET 9, WPFREADME WireTuna.md
Speed and awareness reveal what others miss.
A Windows-first desktop network visibility app described as 'Wireshark for normal humans,' using Windows Packet Monitor instead of Npcap for native capture.
- You need to understand unknown Windows traffic
- You want a friendlier alternative to raw packet tables
Connection mapping
NetView
Live Connection CartographyWindows, Go, local browser dashboardnetview-user-manual.pdf
You cannot defend what you have not named.
A self-contained Go network traffic visualization tool that runs locally, opens a browser dashboard on a random localhost port, and exports graph/session data.
- You want a live visual map of adapter traffic
- You need to identify a chatty source device
Network health diagnostics
NetEye
Signal Path DiagnosisWindows, Go, local browser dashboardneteye-user-manual.pdf
Latency, loss, jitter, and routes tell the story of the path.
A high-performance single-file network diagnostic tool that streams latency, packet loss, jitter, uptime, and traceroute data through a local web UI.
- Calls or streams are unstable
- You need proof of packet loss or jitter
Mesh defense
HoneyMesh
Trust-Scored Mesh DefenseLinux, Go, eBPF/XDP, SQLiteHoneyMesh Operator Manual v2.3.1 and Architecture Deep Dive
Detect locally, enforce early, and share only what trust allows.
A distributed defense platform with local traps, JA4-first fingerprinting, persistent bans, secure dashboard/API, Pro-only HoneyMesh Exchange, and explicit trusted mesh participation.
- You need Linux-side detection and enforcement
- You want local protection that keeps working without a central controller
Data protection
IronClad Vault
Megakey Vault OperationsDesktop GUI, Sentinel server, remote clientIronClad Vault manuals: v3.8.0 ODT, Enterprise User Manual, and v5.0.0 PDF
Sensitive files should stay encrypted until an authorized user truly needs them.
A zero-trust secure storage system for sensitive IP, legal, healthcare, and enterprise documents with classification levels and emergency Megakey recovery.
- You need encrypted local storage
- Users need clearance-based file access
Secure exchange
P2P Chat
Direct Encrypted ExchangeDirect host/client desktop workflowp2p-chat.pdf
When trust is personal, remove the unnecessary middleman.
A simple encrypted P2P connection workflow using host/listener and client roles, a shared generated key, and a dedicated p2pchat_files folder for transfers.
- Two trusted parties need direct encrypted chat
- Files should move without cloud storage