hardenedvault / vault1317Links
Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.
☆24Updated 9 months ago
Alternatives and similar repositories for vault1317
Users that are interested in vault1317 are comparing it to the libraries listed below
Sorting:
- A library for peer discovery inside the Tor network☆28Updated last year
- DarkDotFail's Onion Mirror Guidelines validation library.☆10Updated 4 years ago
- betrusted.io main SoC design☆12Updated 5 years ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆13Updated last month
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆26Updated 3 weeks ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- ☆15Updated 4 years ago
- Docker image for veilid☆10Updated 3 weeks ago
- Methods for IP Address Encryption and Obfuscation.☆12Updated 2 weeks ago
- An HTTP proxy that enables access to Tor Onion Services☆16Updated 3 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆11Updated last year
- OpenSSF Project Template☆18Updated last year
- Library for accessing Intel PCH SPI☆15Updated 3 months ago
- CA Issuers Monitor (Authority Info Access)☆14Updated 2 years ago
- ☆12Updated last year
- ☆20Updated 3 years ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆59Updated 2 weeks ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆19Updated 8 years ago
- Proxy for efficiently circumventing censorship using existing tools and gathering information about censorship around the world.☆14Updated 7 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆17Updated 2 years ago
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆13Updated 8 years ago
- A ImHex plugin to ask the almighty Oracle (OpenAI's Davinci AI) for help identifying file formats☆17Updated 2 years ago
- Security payload for next-Gen firmware architecture☆52Updated last month
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Updated 5 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- Random experiments and shenanigans☆13Updated 2 weeks ago
- A tool for parsing common ACPI tables☆14Updated 4 years ago