hardenedvault / vault1317
Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.
☆23Updated 6 months ago
Alternatives and similar repositories for vault1317:
Users that are interested in vault1317 are comparing it to the libraries listed below
- DarkDotFail's Onion Mirror Guidelines validation library.☆9Updated 4 years ago
- A library for peer discovery inside the Tor network☆27Updated 11 months ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Updated 5 years ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆17Updated 4 years ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆55Updated this week
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆18Updated 11 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 7 months ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆11Updated 2 months ago
- Simple ECIES, ECDSA and AES library for Python, supporting OpenSSL and pure-Python environments☆27Updated 4 years ago
- Geolocate your files!☆16Updated 3 years ago
- A tool for linear and differential cryptanalysis of block ciphers written in Rust☆13Updated 2 years ago
- PANORAMIX repo☆20Updated 2 years ago
- An HTTP proxy that enables access to Tor Onion Services☆15Updated 3 years ago
- ☆11Updated 2 months ago
- Resolver implementation☆26Updated 5 years ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆14Updated 2 months ago
- Build and Interact with a Set of Virtual Machines☆15Updated 2 years ago
- ☆15Updated 4 years ago
- nostr relays list that is generated automatically☆10Updated last year
- [Anti-Forensics, Steganography, Data Exfiltration] Encrypt a file and hide it in any PDF.☆13Updated 7 years ago
- My software engineering notes.☆17Updated 3 weeks ago
- Proxy for efficiently circumventing censorship using existing tools and gathering information about censorship around the world.☆15Updated 6 years ago
- Implementation and simulations for the "Reducing Metadata Leakage from Encrypted Data and Communication with PURBs" paper☆30Updated last year
- C++ SAMv3 library☆37Updated 6 months ago
- Recover Monero address using the private spend key☆11Updated 8 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆10Updated 3 years ago
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)☆31Updated 2 months ago
- Randomizes clock when systems boots by adding a few seconds and nanoseconds to enforce the design goal, that the host clock and Gateway/…☆13Updated 2 months ago