Anonymity research tools for Tornado Cash. Contains deposit reuse clustering and TCash-specific reveals. Whitepaper: https://arxiv.org/abs/2201.06811
-
Updated
Jan 22, 2024 - Python
Anonymity research tools for Tornado Cash. Contains deposit reuse clustering and TCash-specific reveals. Whitepaper: https://arxiv.org/abs/2201.06811
This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governance attack on Tornado Cash in May 2023.
Detect if a contract has been deployed in the latest (or predefined) block from an address that was previously funded through Tornado.Cash.
Implementation of zRA protocol, a non-interactive method for constructing a transparent remote attestation (RA) protocol based on zkSNARKs.
A simple tool to identify whether a given RPC endpoint follows OFAC sanctions list
You can very easily access the Tornado Cash application unblocked through this repo. Moreover, on all networks!
Network Traffic Analysis Obfuscation and IP analysis prevention service
Pedersen Hash for C# .Net
🗿 The bot detects when an account that was funded by Aztec Protocol interacts with any contract
Tornado Cash Hack Explained
This project is a C# implementation of Tornado Cash' encrypted notes
Accessible fund tracing on EVM chains using only Archive nodes and labels
Incremental Merkle Tree (IMT) - a specialized form of a Merkle tree designed to allow for efficient appending of new elements
Add a description, image, and links to the tornado-cash topic page so that developers can more easily learn about it.
To associate your repository with the tornado-cash topic, visit your repo's landing page and select "manage topics."