The Privacy Security Suite is a fully modular, local-first security toolkit designed for individuals, researchers, activists, and organizations who value privacy, independence, and control over their data.
Built with decades of experience — from the Amiga 500 era to modern AI-powered defense — this suite is a statement against mass surveillance, cloud dependency, and big tech data mining.
I've been in tech since the age of 8, growing up with C64, Amiga, 386/486 PCs, and the birth of the internet.
I have seen the transformation from open, free computing to a world where our data is constantly harvested by corporations and governments.
This suite was built as digital self-defense:
- Against mass surveillance
- Against state-controlled censorship
- Against forced cloud dependency
- For true freedom in the digital space
I don't want to choose between "USA or China controlling my data" — I want to keep it myself.
Platform & Development Notes
Currently, the Null Privacy Security Suite has only been tested on Windows 11.
However, the architecture is designed to also be Linux-compatible, and community testing is welcome.
This project was built entirely by a single individual, without sponsors or companies in the background.
It was born out of frustration with the ever‑growing surveillance apparatus, the forced online account requirements of major cloud service providers, and the systematic misuse of personal data for advertising and sales.
The Null Suite is intended to counter this trend, regain control over one’s own data, and block intrusive monitoring.
There will never be a backdoor — and that is exactly why this software is open source.
- Full modular design: Network scanning, process guarding, DNS monitoring, firewall visualization, file integrity monitoring, encrypted messenger, and more.
- Privacy-first: No forced cloud connections. 100% local processing.
- TOR support: Optional TOR routing for scans and communication.
- Safe defaults: Conservative scanning profiles, rate-limiting, IPv6 ready.
- GUI-driven: Dark-theme interface, central launcher, easy to use.
- Fallback modes: Works even with missing optional dependencies.
The suite is modular — each tool handles a specific security domain, but all can work together:
- AI Watchdog → Monitors processes, detects anomalies, alerts the user.
- NetMon → Live network traffic monitoring with protocol breakdowns.
- Network Scanner → Detects hosts, services, vulnerabilities.
- DNS Watcher → Detects suspicious DNS changes, blocking known trackers.
- Firewall Visualizer → Shows real-time block/allow rules in a visual map.
- Crypto Tool → Encrypt/decrypt sensitive files locally.
- Messenger → Peer-to-peer encrypted chat without central servers.
- Launch the suite with TOR enabled.
- Use the encrypted messenger to communicate securely.
- Run DNS Watcher to detect DNS hijacking.
- Use AI Watchdog to monitor for local spyware.
- Use the network scanner to audit all connected devices.
- Enable NetMon to watch for unusual outbound traffic.
- Use Firewall Visualizer to tighten rules.
- Run file integrity monitoring on sensitive company documents.
- Install TOR
- Linux:
sudo apt install tor - Windows: Install the Tor Expert Bundle
- Linux:
- Start TOR
- Linux:
sudo systemctl start tor - Windows: Run
tor.exe
- Linux:
- Configure Suite
- Open settings in the launcher.
- Enable "Route traffic via TOR".
| Feature / Criteria | This Suite | Typical GitHub Security Tools |
|---|---|---|
| Integration | ✅ Full modular suite (Watchdog, Scanner, DNS, Firewall, Crypto, Messenger) | ❌ Usually single-purpose scripts |
| Platform | ✅ Local Python app with full GUI | ❌ Mostly CLI or server-only |
| Privacy | ✅ 100% local processing, TOR support, no cloud dependency | ❌ Often requires API keys, sends data to cloud |
| Network Coverage | ✅ IPv4 + IPv6, TOR routing, stealth profiles, rate-limiting | ❌ Often IPv4-only, no TOR |
| Security Scope | ✅ Host + network + file monitoring combined | ❌ Usually one category only |
| Fallbacks | ✅ Works with reduced functionality if libs missing | ❌ Fails to run without all deps |
| TLS/Cert Checks | ✅ Expiry, anomaly detection, stapling hints | ❌ Rarely included |
| Usability | ✅ Consistent GUI, dark theme, launcher hub | ❌ Minimal UI or none |
| Messaging | ✅ Encrypted P2P messenger included | ❌ No integrated communication |
| Customizability | ✅ Modular design, easy to add new checks | ❌ Often hard-coded logic |
| Security Defaults | ✅ Safe profiles, conservative scanning | ❌ Often aggressive scans by default |
| Target Audience | ✅ Privacy users, researchers, activists, SMBs | ❌ Mostly devs & researchers |
This software is intended only for defensive, educational, and research purposes.
Never scan, monitor, or intrude on systems you do not own or have explicit permission to test.
MIT License — see LICENSE file for details.
Below is a quick tour of the main modules. All run locally with a consistent dark/green UI.
Central entry point to start modules (Monitor, Messenger, Crypto, Network, Processes, Alarms).
Honeytokens, process heuristics, optional ML anomaly detection, and quick firewall/IP actions.
Onion-friendly search UI with filters and meta preview (routes via local Tor SOCKS if configured).
Heuristic + optional ML scoring: DNS, ports, HTTP, TLS, favicon hash; TOR routing toggle.
Onion-based, password‑derived encryption (XChaCha20/Argon2id) + PFS per session, file transfer, rooms.
For questions, suggestions, or responsible disclosure of security issues, please email [email protected].
Note: I'm not online 24/7 — I'll reply when I can.




