Loading HoneyMesh...
Loading HoneyMesh...
Start with the free Community edition for local protection. Upgrade to Pro for Trusted Network Sharing and the Trusted Threat Intelligence Exchange.
Community includes local protection, local blocking, operator visibility, and the open-code workflow needed for single-node or local-only deployments. Required licensing disclosures and public manuals are published below.
Community Edition AMD64 (.deb)
Free Community build for Debian and Ubuntu on x86-64 systems.
Community Edition ARM64 (.deb)
Free Community build for Debian and Ubuntu on AArch64 systems.
Community Edition x86_64 (.rpm)
Free Community build for RHEL, Rocky, AlmaLinux, Fedora, and compatible x86-64 systems.
Community Edition aarch64 (.rpm)
Free Community build for RHEL, Rocky, AlmaLinux, Fedora, and compatible ARM64 systems.
Community
Run HoneyMesh locally with active protection and operator visibility. Community is for single-node and local-only defense without any trusted network participation.
Pro Upgrade
Upgrade to Pro to unlock premium controls, Trusted Network Sharing, and the Trusted Threat Intelligence Exchange. Pro adds coordinated community defense for operators who want broader visibility across connected environments.
Trusted Network Sharing stays off by default.
Even with Pro, sharing and receiving are disabled until the operator explicitly enables the feature. Free Community nodes never publish to or consume from the network mesh.
Trusted Threat Intelligence Exchange
Pro deployments can connect to the hosted Exchange at nettools.cloud for node enrollment, review workflows, sync health, audit visibility, and community intelligence distribution. The Exchange is a Pro-only control plane, while Community users stay in the local HoneyMesh app flow.
Open Trusted Threat Intelligence ExchangePublic documentation is intentionally written to explain operator workflow, product boundaries, and privacy guarantees without publishing sensitive detection logic or attacker-useful implementation detail.
Operator Manual (v2.2.3)
Install, configure, run, and operate HoneyMesh Community and Pro.
Trusted Threat Intelligence Exchange Manual
Portal onboarding, Pro-only Exchange access, node enrollment, sharing controls, and operator workflows.
Architecture Deep Dive
How local protection, JA4 fingerprinting, and Trusted Network Sharing work.
eBPF Security Audit Report
Kernel-path audit summary for the HoneyMesh enforcement layer.
Required publication files for open-source components, including eBPF source scope and generated artifacts.
Shared scope:
• bpf/main.c
• All files within the bpf/ directory
• Generated artifacts that embed or derive from eBPF code, such as `bpf_*.go` and `bpf_*.o`