Appteka Logo
Appteka
MESH app icon

MESH

Verified safe
ExclusiveOpen sourceToolsSilent MiqoRate this app
v0.1.5-alpha (361)
Published Apr 25, 2026
Download APK
90.82 MB
Android 8.0+
40
x86_64, arm64-v8a, armeabi-v7a, x86
Description
Important Public Alpha: Currently in public alpha and under active development. It is not production-ready. A full penetration test is in progress. Until it is complete, do not use this project in production environments. Things may change and breaking changes should be expected. It currently requires some level of technical expertise. Please report bugs or security concerns via GitHub Issues. MESH enables remote wireless debugging for mobile devices, providing mobile forensics & network monitoring over an encrypted, censorship-resistant peer-to-peer mesh network. Mobile devices are often placed behind NAT, firewalls, or restrictive mobile networks that prevent direct inbound access. Traditional remote forensics typically requires centralized VPN servers or risky port-forwarding. MESH solves this by creating an encrypted peer-to-peer overlay network and assigning each node a CGNAT-range address via a virtual TUN interface. Devices appear as if they are on the same local subnet — even when geographically distant or behind multiple NAT layers. This enables remote mobile forensics using ADB Wireless Debugging and libimobiledevice, allowing tools such as WARD, MVT, and AndroidQF to operate remotely without exposing devices to the public internet. The mesh can also be used for remote network monitoring, including PCAP capture and Suricata-based intrusion detection over the encrypted overlay. Allowing for both immediate forensics capture and network capture. MESH is designed specifically for civil society forensics & hardened for hostile/censored networks: Direct peer-to-peer WireGuard transport when available Optional AmneziaWG to obfuscate WireGuard fingerprints to evade national firewalls or DPI inspection Automatic fallback to end-to-end encrypted HTTPS relays when UDP is blocked Meshes are ephemeral and analyst-controlled: bring devices online, collect evidence, and tear the network down immediately afterward. No complicated hub-and-spoke configurations.
Rate this app
0 / 1000
Optional for 4–5 stars. Required for 1–3 stars (min 10 characters).
Ratings & reviews
No reviews yet.