hardenedvault / vault1317Links
Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.
☆24Updated last year
Alternatives and similar repositories for vault1317
Users that are interested in vault1317 are comparing it to the libraries listed below
Sorting:
- A library for peer discovery inside the Tor network☆28Updated last year
- ☆12Updated last year
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 3 years ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆66Updated last week
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 5 months ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆45Updated 11 months ago
- ☆12Updated 2 months ago
- An HTTP proxy that enables access to Tor Onion Services☆16Updated 3 years ago
- Geolocate your files!☆16Updated 3 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- Linux kernel module to fight against police terror☆30Updated 4 years ago
- tools for creating, inspecting and modifying torrent files☆12Updated 3 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)☆31Updated 7 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 3 years ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13Updated last year
- Simple constant-time AES implementation☆120Updated 9 months ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆14Updated 8 years ago
- An ARP/NDP swiss army knife to make MAC going nuts on networks around!☆16Updated last year
- List of crackpot 'scientists' and 'thinkers'☆20Updated 4 months ago
- C SAMv3 library☆32Updated 3 months ago
- Tools for power measurements of post-quantum cryptographic algorithms☆29Updated 5 years ago
- I2P Daemon written in Rust☆14Updated 8 years ago
- Methods for IP Address Encryption and Obfuscation.☆25Updated last week
- All the microcodes, but packaged!☆44Updated last month
- 🐍 i2plib: A modern asynchronous library for building I2P applications☆36Updated 6 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated 2 months ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 4 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆59Updated last month
- Reseed data management tools for I2P☆38Updated 8 months ago