tornadocash / tornado-treesLinks
☆15Updated 3 years ago
Alternatives and similar repositories for tornado-trees
Users that are interested in tornado-trees are comparing it to the libraries listed below
Sorting:
- ☆28Updated 3 years ago
- ☆33Updated last month
- A trustless wallet scoring protocol☆22Updated 2 years ago
- Merge Mock - testing tool for the Ethereum Merge☆41Updated 3 years ago
- iden3 documentation☆14Updated 2 years ago
- Verifying merkle multiproofs in solidity example (unaudited)☆44Updated 3 years ago
- A generic example of ERC721 indexing with The Graph☆21Updated 4 years ago
- Social Recovery Wallet that hides the identities of Guardians until recovery.☆48Updated 4 years ago
- ☆20Updated 2 years ago
- An Ethereum Tx Station - Batch transactions and save 30% on gas costs. 🚄🚃🚃🚃🚃🚃🚃🚃🚃🚃🚃🚃🚃🚃💨☆28Updated 3 years ago
- A private and non-repudiable reputation system☆16Updated 3 years ago
- Write a recipe in minutes to convert your dApp to a zkApp.☆33Updated this week
- ☆29Updated 3 years ago
- Log function calls as events☆16Updated 4 years ago
- Horizon - a trustless harmony to ethereum bridge☆36Updated 3 years ago
- CLI utility that broadcasts BTC, ETH, SOL, ZEC & XMR transactions through TOR using public block explorers☆74Updated last year
- Yield Protocol v1☆45Updated 2 years ago
- Basic interaction with the Compound suite of smart contracts☆13Updated 3 years ago
- The safe-config-service is a service that provides configuration information in the context of the Safe clients environment☆34Updated this week
- Hermez network protocol smart contracts☆38Updated 3 years ago
- ☆42Updated 4 years ago
- Novel zero-knowledge proof based social recovery of smart contract wallets☆34Updated 3 years ago
- Maximizing liquidity utilization while maintaining 50/50 inventory ratio☆27Updated 3 years ago
- Uniswap V3 Range Orders☆41Updated 4 years ago
- KYC without doxxing yourself. Prove your identity to a third party without disclosing it.☆41Updated 2 years ago
- Extension for zk succinct non-interactive ownership proofs.☆40Updated 3 years ago
- Prevent frontrunning and malicious MEV on Ethereum by using a threshold cryptography-based distributed key generation (DKG) protocol.☆68Updated 9 months ago
- ☆80Updated 2 years ago
- Primitive protocol solidity contracts.☆42Updated 3 years ago
- It provides helper functions to test the maple-core contracts.☆25Updated 3 years ago