A tool for checking BigSpender vulnerability in your Bitcoin wallet
☆38Mar 10, 2021Updated 4 years ago
Alternatives and similar repositories for big-spender
Users that are interested in big-spender are comparing it to the libraries listed below
Sorting:
- U2f implementation with threshold signatures☆16Nov 24, 2020Updated 5 years ago
- Scriptless atomic cross-chain (and cross-curve) swap protocol based on a fair exchange of secrets.☆34Jan 19, 2021Updated 5 years ago
- distributed RSA modulus generation in Rust☆15Mar 19, 2022Updated 3 years ago
- Rust implementation of Zcash multi-signautres☆13Jun 23, 2019Updated 6 years ago
- ☆15May 27, 2021Updated 4 years ago
- ☆16Jun 21, 2021Updated 4 years ago
- A list of exceptionally good cryptography libraries that inspire our work☆15Jul 26, 2019Updated 6 years ago
- Compiler for BitML☆27Mar 10, 2022Updated 3 years ago
- Fast additive accumulators☆14Nov 16, 2020Updated 5 years ago
- Rust library for building IQC: cryptography based on class groups of imaginary quadratic orders☆67Feb 13, 2023Updated 3 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- lightning BOLT 11 invoice implementation☆20Apr 13, 2021Updated 4 years ago
- Simple RSA VDF in Rust☆21Apr 13, 2021Updated 4 years ago
- Driver for round-based protocols in Rust☆24Jan 17, 2024Updated 2 years ago
- bitcoin replace-by-fee double spend tool☆26May 26, 2015Updated 10 years ago
- Regtest Lightning Networks for (python) integration testing☆17Mar 3, 2023Updated 3 years ago
- AppCoins is a blockchain-based protocol for the App Economy supported by the Aptoide App Store, and the first ICO serving 200 million us…☆12May 22, 2018Updated 7 years ago
- Find nodes and set up payment channels automatically☆18Jun 9, 2019Updated 6 years ago
- ☆23Jul 11, 2021Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- GooSig: short signatures from RSA that hide the signer's RSA public key☆12Jan 8, 2020Updated 6 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ECDSA based construction for Anonymous Multi-Hop Locks (https://eprint.iacr.org/2018/472.pdf)☆43Jul 22, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- An implementation for fair auditing and contingent payments in Bitcoin☆23Sep 11, 2017Updated 8 years ago
- Lightning Network Simulator☆24Aug 25, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- The monorepo for Meson project☆11May 30, 2024Updated last year
- ☆12Jun 25, 2021Updated 4 years ago
- Efficient zero-knowledge arguments in the discrete log setting, revisited☆16Mar 4, 2020Updated 6 years ago
- ☆10Oct 22, 2019Updated 6 years ago
- Unsafe 3-round MuSig in Python for experimentation☆11Jan 12, 2023Updated 3 years ago
- A Python simulator used to model cross shard transaction strategies for Ethereum 2.0☆11May 3, 2024Updated last year
- Cryptographic accumulator☆10Mar 8, 2018Updated 7 years ago
- Tool to fetch and analyze blockchain transactions☆10Mar 9, 2021Updated 4 years ago
- Hackathon project for Snarky workshop.☆11Jun 21, 2019Updated 6 years ago