This project is a C# implementation of Tornado Cash' encrypted notes
-
Updated
May 30, 2022 - C#
This project is a C# implementation of Tornado Cash' encrypted notes
Accessible fund tracing on EVM chains using only Archive nodes and labels
Incremental Merkle Tree (IMT) - a specialized form of a Merkle tree designed to allow for efficient appending of new elements
🗿 The bot detects when an account that was funded by Aztec Protocol interacts with any contract
Tornado Cash Hack Explained
Network Traffic Analysis Obfuscation and IP analysis prevention service
Pedersen Hash for C# .Net
You can very easily access the Tornado Cash application unblocked through this repo. Moreover, on all networks!
A simple tool to identify whether a given RPC endpoint follows OFAC sanctions list
Implementation of zRA protocol, a non-interactive method for constructing a transparent remote attestation (RA) protocol based on zkSNARKs.
Detect if a contract has been deployed in the latest (or predefined) block from an address that was previously funded through Tornado.Cash.
This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governance attack on Tornado Cash in May 2023.
Anonymity research tools for Tornado Cash. Contains deposit reuse clustering and TCash-specific reveals. Whitepaper: https://arxiv.org/abs/2201.06811
Add a description, image, and links to the tornado-cash topic page so that developers can more easily learn about it.
To associate your repository with the tornado-cash topic, visit your repo's landing page and select "manage topics."