This is a quick introduction to getting started with the zkSnark Groth16 algorithm.
☆22Sep 6, 2024Updated last year
Alternatives and similar repositories for zkSnark-Groth16-Getting-Started
Users that are interested in zkSnark-Groth16-Getting-Started are comparing it to the libraries listed below
Sorting:
- This is the repo for Taskfile demo☆12Aug 10, 2024Updated last year
- Enigma Machine in C☆13Nov 1, 2024Updated last year
- ☆13Nov 29, 2024Updated last year
- ☆13Aug 15, 2024Updated last year
- Include halo2 example circuits☆10Jul 4, 2022Updated 3 years ago
- A minimalist microblogging platform 🐦🔇☆10Feb 22, 2026Updated 2 weeks ago
- BSides, OWASP, DEFCON, RSAC, SANS Talk Material, References and Extra Bits☆14Jul 19, 2025Updated 7 months ago
- Public Audits in the NEAR Ecosystem☆14Jun 10, 2024Updated last year
- Minimalistic Keyboard Driven Browser 🌐🎀☆14May 21, 2025Updated 9 months ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- Guvenkaya Public Security Assessment Reports☆12Jan 26, 2026Updated last month
- Pure Rust implementation of the PLONK ZKProof System done by the Dusk-Network team.☆15Aug 10, 2020Updated 5 years ago
- The nightmare giving MySQL migrator☆10Aug 19, 2016Updated 9 years ago
- ☆12Nov 11, 2023Updated 2 years ago
- A halo2 implementation of on-chain DCAP attestation verification☆15Sep 9, 2024Updated last year
- 本科学习资料备份☆12Mar 23, 2020Updated 5 years ago
- A tutorial on creating a Groth16 proof and verifying it on-chain in a Solana☆19Oct 10, 2024Updated last year
- Ethical Hacking Roadmap 🌐🔒☆11Dec 19, 2023Updated 2 years ago
- Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)☆12Sep 5, 2024Updated last year
- Exfiltrate data using ping and PowerShell, no admin access required☆15Mar 26, 2024Updated last year
- ☆11Jan 1, 2025Updated last year
- Universal prompt for Power users 💪🌈☆20May 14, 2025Updated 9 months ago
- e2e Scanning research module☆22Jun 30, 2025Updated 8 months ago
- Hacking and Learning consistently for 100 days straight af.☆18Apr 12, 2022Updated 3 years ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- The Automata AMD SEV-SNP Attestation SDK is a software development kit designed to help users generate the AMD SEV-SNP Attestation Report…☆20Updated this week
- 🚀 👀 The website of Android Dev Notes. Content contributions are welcome! Found something interesting related to Android, just add it! c…☆11Dec 5, 2024Updated last year
- ☆17Jun 15, 2022Updated 3 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- Burp-Suite Professional v1.7.37 Cracked☆19Sep 9, 2025Updated 6 months ago
- ☆16Nov 29, 2025Updated 3 months ago
- My bitcoin fork with many useful work branches for different purposes.☆14Sep 15, 2018Updated 7 years ago
- ☆12Dec 11, 2022Updated 3 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- A tool to extract gnark circuits defined in Go to Lean for formal verification.☆15Apr 4, 2025Updated 11 months ago
- Tools Instagram (Features: Delete All Photo, Unfollow All Following, Unfollow Not FollowBack, and Much More)☆14Jun 30, 2018Updated 7 years ago
- Kubernetes website and documentation repo:☆13Aug 18, 2021Updated 4 years ago
- Contains several examples and challenges to use Lambdaworks☆15Sep 7, 2023Updated 2 years ago