Loading HoneyMesh...
Loading HoneyMesh...
Download the latest HoneyMesh Iron-Hive packages, then use the app to enable trusted sharing, join approved mesh peers, and review shared attack intelligence when it fits your environment.
These are the current HoneyMesh Iron-Hive packages for Debian, Ubuntu, RHEL-family systems, and direct tarball installs. Local protection works on its own, and Pro adds the in-app sharing and trusted mesh workflows described in the manuals below.
Iron-Hive AMD64 (.deb)
Current Linux package for Debian and Ubuntu on x86-64 systems.
Iron-Hive ARM64 (.deb)
Current Linux package for Debian and Ubuntu on ARM64 systems.
Iron-Hive x86_64 (.rpm)
Current Linux package for RHEL, Rocky, AlmaLinux, Fedora, and compatible x86-64 systems.
Iron-Hive aarch64 (.rpm)
Current Linux package for RHEL, Rocky, AlmaLinux, Fedora, and compatible ARM64 systems.
Iron-Hive AMD64 (.tar.gz)
Portable tarball package for Linux x86-64 environments.
Iron-Hive ARM64 (.tar.gz)
Portable tarball package for Linux ARM64 environments.
Community
Run HoneyMesh locally with active protection and operator visibility. Community is for single-node and local-only defense without any trusted network participation.
Pro Upgrade
Upgrade to Pro to unlock premium controls, trusted sharing, trusted mesh participation, and shared attack intelligence. Pro adds coordinated defense for operators who want broader visibility across connected environments without giving up local control.
Trusted Network Sharing stays off by default.
Even with Pro, sharing and receiving are disabled until the operator explicitly enables the feature. Free Community nodes never publish to or consume from the network mesh.
Trusted sharing stays in the app
From the HoneyMesh app, admins can enable trusted sharing, review peer identity, and decide whether another network belongs in the mesh before any outside signal influences local enforcement. The coordination path stays lightweight and explicit instead of hiding behind a generic sync toggle.
Public documentation is intentionally written to explain operator workflow, product boundaries, and privacy guarantees without publishing sensitive detection logic or attacker-useful implementation detail.
Operator Manual (v2.3.1)
Install, configure, run, and operate HoneyMesh Community and Pro.
Trusted Sharing Manual
Portal onboarding, node enrollment, sharing controls, and operator workflows.
Architecture Deep Dive
How local protection, JA4 fingerprinting, and trusted sharing work.
eBPF Security Audit Report
Kernel-path audit summary for the HoneyMesh enforcement layer.
Required publication files for open-source components, including eBPF source scope and generated artifacts.
Shared scope:
- bpf/main.c
- All files within the bpf/ directory
- Generated artifacts that embed or derive from eBPF code, such as `bpf_*.go` and `bpf_*.o`