[ MESH ]
Warning
Please be aware this project is currently in public alpha. We take security seriously, and we recommend not using this in production till we have conducted a full penetration-test. This is scheduled at the start of 2026. Features and APIs may change. Please report issues on GitHub.
MESH is a censorship-resisting, peer-to-peer first, end-to-end encrypted overlay network for digital forensics. It's a fork of the Tailscale protocol, but is self-hostable and heavily modified for civil society and forensic operations.
Key features:
- Censorship resistance - Uses AmneziaWG obfuscation for hostile or censored networks, and falls back to encrypted HTTPS relays when UDP is blocked. This offers protection against the GFW and detection by Deep Packet Inspection (DPI) systems.
- Peer-to-peer connections - Creates direct encrypted tunnels between devices, removing the need for hub-and-spoke topologies
- Rapid deployment - Spin up a forensics mesh, collect data, tear it down, and start again in minutes without complex configuration
What you can do with MESH:
- Remote Android forensics - Connect to Android devices anywhere in the world via ADB-over-WiFi
- Automated spyware detection - Integrates with AndroidQF and MVT for IOC checks
- Network monitoring - Capture network traffic (PCAP) from remote devices
- Secure data transfer - Collect forensic artifacts like bug reports and system dumps over encrypted connections
- Team collaboration - Multiple analysts can work on different devices through the same secure network
- Quick setup and teardown - Create investigation networks in minutes, tear them down when done
Mesh networking, made for remote mobile forensics
-
MESH networking
Discover why using a MESH network is a powerful way to build secure ephemeral remote forensic networks for threat analysis and forensics
-
Architecture
Learn about the three core components that power MESH
-
Use cases
See how MESH helps investigators in real-world scenarios
-
Platform support
Check which platforms are supported and what's coming next
Quick start
Ready to get started? Follow our step-by-step guide:
-
Getting started guide
Complete setup guide from zero to your first forensic collection
Or jump directly to a specific component:
- Set up the control plane - Deploy your self-hosted coordination server
- Install the analyst client - Set up your Linux/macOS forensic workstation
- Deploy the endpoint client - Install the MESH app on target devices
- Verify your setup - Test connectivity and run your first collection
Learn more
Documentation
- Architecture - Deep dive into how MESH works under the hood
- User guide - Learn forensic workflows and best practices
- AmneziaWG configuration - Configure censorship resistance
- CLI reference - Complete command-line documentation
- Troubleshooting - Common issues and solutions
About the project
- About BARGHEST - Learn about the team behind MESH
- Platform support - Current and planned platform support
- Get help - Community, support, and contributing