Stars
The Marmot Protocol is a messaging protocol that specifies how to do efficient end-to-end encrypted group messaging using Nostr's decentralized identity & relay network combined with the MLS Protocol.
A lightweight, yet feature-rich, ephemeral chat client built on Nostr protocol, bridged with Bitchat for anonymous, temporary messaging.
A simple Bitcoin stratum proxy
Decentralized Alternative Templates for Universal Mining
An MCP for WireShark (tshark). Empower LLM's with realtime network traffic analysis capability
💥 A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden.
Cloudflare R2 bucket File Uploader with multipart upload enabled. Tested with files up to 10 GB size.
Anonostr allows users to send anonymous notes to the Nostr network without revealing their identity. For each note submission, the app generates a new key pair, sends the note through select relays…
request module that supports cloudflare anti ddos pages
real time face swap and one-click video deepfake with only a single image
A list of nostr relays exposed as onion services
Completely block Amazon and its services
Completely block Google and its services
A reverse Nostr relay that ONLY requests events from all online relays
Do you think banning end-to-end encryption is plausible? Think again.
your relay is awesome, its canonical should be too
a truly censorship-resistant alternative to Twitter that has a chance of working
A serverless Nostr relay through Cloudflare Workers and Durable Objects
A comprehensive All-in-One AdGuard Filter List optimized for DNS level blocking of Ads, Analytics, Tracking, Malware & Scam.
Framework for building Nostr web applications.
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
See a demo at https://fiatjaf.com/nostr.html
Embeddable comments for your website, backed by Nostr. Like Disqus but Nostr.
Zap any Nostr npub or note from anywhere.
The perfect butler for pentesters, bug-bounty hunters and security researchers