hardenedvault / vault1317
Off-chain secure communication protocol with Zero-knowledge proof (Ring Signature) and metadata protection.
☆23Updated 4 months ago
Alternatives and similar repositories for vault1317:
Users that are interested in vault1317 are comparing it to the libraries listed below
- A library for peer discovery inside the Tor network☆28Updated 9 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Updated 5 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆17Updated 9 months ago
- Hacking a BusKill self-destruct trigger for veracrypt-encrytped volumes☆16Updated 4 years ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆12Updated last month
- Multithreaded password cracker for SHA1, SHA256, SHA384, SHA512, and MD5 hash functions, coded in C#. This tool allows you to test the st…☆9Updated 2 years ago
- PANORAMIX repo☆20Updated 2 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆23Updated 9 years ago
- Geolocate your files!☆16Updated 3 years ago
- Build and Interact with a Set of Virtual Machines☆15Updated 2 years ago
- Secure Distributed Web Date; privacy, anonymity and Tor friendly; console time fetcher and daemon; optional graphical user interface etc.…☆54Updated 2 weeks ago
- A script for SOC operators' first analysis. Add new player in the game.☆8Updated 2 years ago
- Checks for tpm vulnerabilities☆36Updated last year
- Scripts to build the Linux kernel from a config file and initrd from a list of programs☆22Updated last year
- An improved firecfg written in python.☆17Updated 7 months ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆13Updated last week
- List of Hardware Wallets for Digital Forensics☆27Updated last month
- betrusted.io main SoC design☆12Updated 4 years ago
- List of crackpot 'scientists' and 'thinkers'☆14Updated 5 months ago
- A PRF with low multiplicative complexity☆21Updated 4 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- An HTTP proxy that enables access to Tor Onion Services☆15Updated 3 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Updated last year
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆9Updated 2 weeks ago
- Docker image for veilid☆9Updated 2 months ago
- Fork of dnscrypt-proxy to implement a multiple-relay-based DNS anonymization protocol (mu-ODNS)☆31Updated last week
- I2P analysis network.☆14Updated 8 years ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆9Updated 8 months ago