
90.82 MB
Android 8.0+
40
x86_64, arm64-v8a, armeabi-v7a, x86
Verified safeScanned with ClamAV, APKiD, and Quark-Engine. No threats detected.
Description
Important
Public Alpha: Currently in public alpha and under active development. It is not production-ready. A full penetration test is in progress. Until it is complete, do not use this project in production environments. Things may change and breaking changes should be expected. It currently requires some level of technical expertise. Please report bugs or security concerns via GitHub Issues.
MESH enables remote wireless debugging for mobile devices, providing mobile forensics & network monitoring over an encrypted, censorship-resistant peer-to-peer mesh network.
Mobile devices are often placed behind NAT, firewalls, or restrictive mobile networks that prevent direct inbound access. Traditional remote forensics typically requires centralized VPN servers or risky port-forwarding.
MESH solves this by creating an encrypted peer-to-peer overlay network and assigning each node a CGNAT-range address via a virtual TUN interface. Devices appear as if they are on the same local subnet — even when geographically distant or behind multiple NAT layers.
This enables remote mobile forensics using ADB Wireless Debugging and libimobiledevice, allowing tools such as WARD, MVT, and AndroidQF to operate remotely without exposing devices to the public internet.
The mesh can also be used for remote network monitoring, including PCAP capture and Suricata-based intrusion detection over the encrypted overlay. Allowing for both immediate forensics capture and network capture.
MESH is designed specifically for civil society forensics & hardened for hostile/censored networks:
Direct peer-to-peer WireGuard transport when available
Optional AmneziaWG to obfuscate WireGuard fingerprints to evade national firewalls or DPI inspection
Automatic fallback to end-to-end encrypted HTTPS relays when UDP is blocked
Meshes are ephemeral and analyst-controlled: bring devices online, collect evidence, and tear the network down immediately afterward. No complicated hub-and-spoke configurations.
Rate this app
Ratings & reviews
No reviews yet.