Apps

Meet the NetTools ecosystem

Each app profile is grounded in the supplied manuals: Windows visibility, connection mapping, network health diagnostics, HoneyMesh defense, local-first vaulting, and encrypted peer-to-peer transfer.

Tool profiles

Choose the right documented tool

The academy teaches when to use each tool, what it requires, and what the manual says it can do.

Application-aware visibility

WireTuna

Live Traffic Sensemaking
Windows desktop, .NET 9, WPFREADME WireTuna.md

Speed and awareness reveal what others miss.

A Windows-first desktop network visibility app described as 'Wireshark for normal humans,' using Windows Packet Monitor instead of Npcap for native capture.

  • You need to understand unknown Windows traffic
  • You want a friendlier alternative to raw packet tables
Connection mapping

NetView

Live Connection Cartography
Windows, Go, local browser dashboardnetview-user-manual.pdf

You cannot defend what you have not named.

A self-contained Go network traffic visualization tool that runs locally, opens a browser dashboard on a random localhost port, and exports graph/session data.

  • You want a live visual map of adapter traffic
  • You need to identify a chatty source device
Network health diagnostics

NetEye

Signal Path Diagnosis
Windows, Go, local browser dashboardneteye-user-manual.pdf

Latency, loss, jitter, and routes tell the story of the path.

A high-performance single-file network diagnostic tool that streams latency, packet loss, jitter, uptime, and traceroute data through a local web UI.

  • Calls or streams are unstable
  • You need proof of packet loss or jitter
Mesh defense

HoneyMesh

Trust-Scored Mesh Defense
Linux, Go, eBPF/XDP, SQLiteHoneyMesh Operator Manual v2.3.1 and Architecture Deep Dive

Detect locally, enforce early, and share only what trust allows.

A distributed defense platform with local traps, JA4-first fingerprinting, persistent bans, secure dashboard/API, Pro-only HoneyMesh Exchange, and explicit trusted mesh participation.

  • You need Linux-side detection and enforcement
  • You want local protection that keeps working without a central controller
Data protection

IronClad Vault

Megakey Vault Operations
Desktop GUI, Sentinel server, remote clientIronClad Vault manuals: v3.8.0 ODT, Enterprise User Manual, and v5.0.0 PDF

Sensitive files should stay encrypted until an authorized user truly needs them.

A zero-trust secure storage system for sensitive IP, legal, healthcare, and enterprise documents with classification levels and emergency Megakey recovery.

  • You need encrypted local storage
  • Users need clearance-based file access
Secure exchange

P2P Chat

Direct Encrypted Exchange
Direct host/client desktop workflowp2p-chat.pdf

When trust is personal, remove the unnecessary middleman.

A simple encrypted P2P connection workflow using host/listener and client roles, a shared generated key, and a dedicated p2pchat_files folder for transfers.

  • Two trusted parties need direct encrypted chat
  • Files should move without cloud storage