Anonymity research tools for Tornado Cash. Contains deposit reuse clustering and TCash-specific reveals. Whitepaper: https://arxiv.org/abs/2201.06811
-
Updated
Jan 22, 2024 - Python
Anonymity research tools for Tornado Cash. Contains deposit reuse clustering and TCash-specific reveals. Whitepaper: https://arxiv.org/abs/2201.06811
This repository implements a simplified PoC that showcases how a contract can morph. A similar approach was used as part of the governance attack on Tornado Cash in May 2023.
Detect if a contract has been deployed in the latest (or predefined) block from an address that was previously funded through Tornado.Cash.
Implementation of zRA protocol, a non-interactive method for constructing a transparent remote attestation (RA) protocol based on zkSNARKs.
A simple tool to identify whether a given RPC endpoint follows OFAC sanctions list
You can very easily access the Tornado Cash application unblocked through this repo. Moreover, on all networks!
Pedersen Hash for C# .Net
Network Traffic Analysis Obfuscation and IP analysis prevention service
🗿 The bot detects when an account that was funded by Aztec Protocol interacts with any contract
This project is a C# implementation of Tornado Cash' encrypted notes
Tornado Cash Hack Explained
Accessible fund tracing on EVM chains using only Archive nodes and labels
Incremental Merkle Tree (IMT) - a specialized form of a Merkle tree designed to allow for efficient appending of new elements
Add a description, image, and links to the tornado-cash topic page so that developers can more easily learn about it.
To associate your repository with the tornado-cash topic, visit your repo's landing page and select "manage topics."