hardenedvault / vault1317Links
Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.
☆24Updated last year
Alternatives and similar repositories for vault1317
Users that are interested in vault1317 are comparing it to the libraries listed below
Sorting:
- A library for peer discovery inside the Tor network☆28Updated last year
- Geolocate your files!☆16Updated 3 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 6 months ago
- ☆12Updated 4 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 3 years ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆18Updated 3 weeks ago
- An HTTP proxy that enables access to Tor Onion Services☆16Updated 4 years ago
- List of Hardware Wallets for Digital Forensics☆27Updated last year
- Linux kernel module to fight against police terror☆30Updated 4 years ago
- Ecash wallet implementation in javacard☆12Updated 3 months ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆68Updated 2 weeks ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Updated 6 years ago
- 🥸 Experimental p2p gossip network for OpenPGP signature transparency 🥸☆35Updated this week
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- Proof of concept tool to detect RandomX cryptojacking malware on Windows☆65Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Few tools for a Tor relay.☆61Updated last week
- Resolver implementation☆26Updated 6 years ago
- ☆13Updated last year
- quotes i like.☆16Updated 6 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- USB armory - hardware control tool☆33Updated 3 months ago
- A proof-of-concept implementation of a Grin-Bitcoin atomic swap☆18Updated 5 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆14Updated 8 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- ☆21Updated 4 years ago
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)☆30Updated 8 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆78Updated 3 months ago
- All the microcodes, but packaged!☆45Updated last week
- Determinstic backup and recovery of PGP keys using human-readable phrases.☆82Updated last year