A collection of tools, websites and community creations directories from hloth.dev
Open OXEN Name System list, updated automatically from the blockchain.
Explore ONS records in OXEN blockchain, filter by owner, lookup by partial text query for unhashed names, view estimated money spent on all records by specified owner. Local-first, fully mobile-optimized. Purchase system allows you to buy any ONS name in 30 seconds without having to own oxen wallet and buying crypto — just type in name you want, pay money and it will be automatically pushed to blockchain along with sending you wallet-owner mnemonic to specified email (if you specified it).
A place to discover bots created by Session messenger developers community.
Session Open Group Server implementation written in JavaScript using bun.sh.
Aims to be very fast, flexible and extensible. Drop-in replacement for pysogs — works with the same database schema. Bunsogs support everything pysogs has, but it's better.
Can be used on any OS where Bun runs (any Linux, Windows, MacOS)
JavaScript library for programmatic use of the Session messenger
Supports server and browser environment with built-in proxy network module. Shipped with TypeScript definitions. Tested with bun:test. Written with blazingly fast Bun
Session.js allows you to create:
Features:
Opensource Session client written with performance, design and user experience in mind.
Uses native Swift and other native technologies of macOS and aims to run with latest technologies rather to be compatible with all devices, thus it requires at least macOS 14.0 or later.
Isn't entirely native, as its backend is written with my Session.js crossplatform Session framework. It doesn't matter though, because frontend must be reactive and backend can be anything. You won't experience any lags, because data is stored/retrieved using native SwiftData. Moreover, Session.js is written in Bun, which is very fast and comparable to Rust or even low-level languages.
No onion routing for now, but you can setup onion routing on your network side yourself, also proxy settings are available
While macOS protects applications data good enough, please be aware that app database is not encrypted, and thus can be accessed if malware has unrestricted access to your filesystem and you allowed it to read apps storage. Mnemonics are stored in keychain, which should make their retrieval harder for malicious actors.
Simple, fast and flexible Session ID vanity generator tool.
This tool bruteforces mnemonics and looks for Session IDs matching your specific pattern. The website works 100% clientside and allows you to specify how many workers you want to spawn.
I recommend inputting 4 to 5 characters if you have a decent PC.
You can configure how many workers to spawn (from 1 to Math.ceil(navigator.hardwareConcurrency / 3)) and that directly influences how many IDs per second your PC will bruteforce. But most likely your PC will limit threads to about 60%-80% of maximum allowed threads to spawn. Basically, setting 10 workers will likely get you same results as settings 7 workers.
Number of characters you inputted DOES NOT practically affect bruteforce speed. So type anything, look at "XXXX IDs/s" and compare that number to this table (I take 30k ids/s as average):
Characters after "05" | Time for 50% probability (seconds) | Time for 25% probability (seconds) |
---|---|---|
1 | 0.00036 | 0.00015 |
2 | 0.0059 | 0.0025 |
3 | 0.0946 | 0.0393 |
4 | 1.5142 | 0.6284 |
5 | 24.227 | 10.055 |
6 | 387.636 | 160.883 |
7 | 6202 (1.7 hours) | 2574 |
8 | 99234 (27 hours) | 41186 |
9 | 1587757 (18 days) | 658978 |
10 | 25404112 (294 days) | 10543659 |
Unofficial Session messenger client for Apple Watch, targeting watch OS 10.
Supported features:
Signing in requires a server with hosted companion website. In simple terms, user is redirected there to input their mnemonic on any device they find comfortable and secure. Mnemonic is encrypted locally and stored on server shortly for watches to sync into its storage. Read in details in website's repository.
Experimental project running Session messenger in a web browser online.
Works in Tor! 99% client-side (still requires proxy to swarms though). All encryption and private keys never leave browser.
Be aware that I didn't care about best practices when writing this code, it does not use any security measures implemented in official clients, it does not prevent you from any kind of malicious attack, for example MITM. Backend requests to nodes aren't onion routed. SSL certificate pinning is not implemented (bun does not support this yet). This client does not support any cool features and is not maintained for security vulnerabilities found in code or dependencies.