hardenedvault / vault1317Links
Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.
☆24Updated last year
Alternatives and similar repositories for vault1317
Users that are interested in vault1317 are comparing it to the libraries listed below
Sorting:
- A library for peer discovery inside the Tor network☆28Updated last year
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 7 months ago
- Geolocate your files!☆16Updated 4 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆38Updated 3 years ago
- Suite of symmetric cryptography primitives built on top of the ASCON permutation☆46Updated last year
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Updated last year
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆67Updated 2 weeks ago
- Simple constant-time AES implementation☆120Updated 11 months ago
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)☆30Updated 9 months ago
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- 🥸 Experimental p2p gossip network for OpenPGP signature transparency 🥸☆35Updated 3 weeks ago
- quotes i like.☆16Updated 6 years ago
- tools for creating, inspecting and modifying torrent files☆13Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Updated 6 years ago
- generate pgp keys with vanity fingerprints☆18Updated 9 years ago
- ☆12Updated 3 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 5 years ago
- Linux kernel module to fight against police terror☆30Updated 4 years ago
- Sanitize documents to safe PDFs, for active content removal☆48Updated 5 months ago
- trustor (PoC)☆25Updated 4 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆15Updated 3 years ago
- Ecash wallet implementation in javacard☆12Updated 4 months ago
- An HTTP proxy that enables access to Tor Onion Services☆16Updated 4 years ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆26Updated 5 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 5 years ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆19Updated last month
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆15Updated 9 months ago
- Tools to recover, extract and decrypt metamask wallets☆22Updated 3 weeks ago
- A tool to encode and decode content as whitespace☆18Updated 2 years ago