Manual
Manual
1
AAF9CA1E7A9A6CF979977CB248C175A2057088AC50C30000000000001976A914948E
python bitcoin2jhon.py wallet.dat
hashcat.exe --help
hashcat.exe --opencl-info
hashcat.exe --benchmark
hashcat.exe -b -m 11300
hashcat.exe -a 3 -m 1400 hash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a --force -t 2
hashcat -a 0 -m 11300 hash.txt F:\cms\hashcat-6.2.4\masks --force -D 2
hashcat.exe -m 11300 -a 3 hash.txt dictionary.txt --force -D 2
hashcat.exe -m 11300 -a 0 hash.txt lab1 --force -D 2
hashcat.exe -m 11300 -a 3 hash.txt --stdout
hashcat.exe -a 3 -m 11300 hash.txt -i --increment-min=8 --increment-max=9 R, ukl?
a? a? a? a? a? a --force -D 2
hashcat.exe -a 3 -m 11300 hash.txt -i --increment-min=8 --increment-max=8 R, u, k,
l? a? a? a? a? a?
hashcat.exe -a 3 -w 3 -m 11300 -i --increment-min=13 --increment-max=13
$bitcoin$64$aea1763feebbb4cfbaf4d061333288baf55d204b62c9138c48dcf2e83d8fa84c$16$a09
f04ca2f8495f5$25000$2$00$2$00 ilovebitcoin?a -D 2 --quiet --potfile-disable
###################################################################################
###################################
cd C:\btcrecover-master
C:\Python27\python btcrecover.py --tokenlist token.txt --listpass
C:\Python27\python btcrecover.py --wallet wallet.dat --tokenlist token.txt
--autosave save.txt
python bitcoin-balance-checker.py
VanitySearch.exe -i wallet.txt -o 9.txt -t 2
VanitySearch.exe -s "AliceSeed" -kp
VanitySearch.exe -sp
028d26200250cebdae120ef31b04c80cd50d4cddc8eadbcf29fc696d32c0ade462 -t 0 -gpu -stop
-o keyinfo.txt 13zb1hQbWVsc2S
BitCrack64.exe -i wallet.txt -o 2.txt -t 2
python bitcoin-balance-checker.py list-addresses.txt
oclvanitygen.exe -k -o C:\Users\User\Desktop\2323\1.txt 1Bitcoin
keyconv.exe -k -o C:\Users\User\Desktop\2323\1.txt 1Bitcoin
keyhunt.exe -t 4 -m bsgs -f pu.txt -k 128 -r
2684c2e58e9b04570f1fd000000000:ffffffffffffffffffffffffffffff -R
keyhunt.exe -t 10 -m address -f 1.txt -k 4 -b 160 -R
keyhunt.exe -t 2 -m rmd160 -f 64.rmd -k 32 -r 6abe1f9a36b414:7fffffffffffff
keyhunt.exe -t 4 -m bsgs -f 1.txt -n 0x1000000000000000000 -k 4 -256 -s 10
keyhunt.exe -t 4 -m address -f addresses.txt -r 1:FFFFFFFF -M -n 8 -B random
keyhunt.exe -t 4 -m bsgs -f 1.txt -M -s 10 -S -k 4 -b 256
keyhunt.exe -t 10 -m address -f 1.txt -n 0x1000000000000000000 -M -s 2 -S -k 128
-b 60
keysubtracter.exe -o 3.txt -r
fd7720f353a4c0a237c32b16cfd7720df321b9c373404d89bb634bdf100d29ca:ffffffffffffffffff
fffffffffffffebaaedce6af48a03bbfd25e8cd0364140 -n 10000000 -p
0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798 -R
keyhunt.exe -m xpoint -f tests/8.txt -n 65536 -t 4 -b 60 -R
keyhunt.exe -m address -t 6 -l compress -r 1:3fffffff -v
15JhYXn6Mx3oF4Y7PcTAv2wVVAuCF
keyhunt.exe -m rmd160 -f tests/puzzleswopublickey.txt -t 2 -r 1: 3fffffff
keyhunt.exe -m address -l compress -R -b 66 -v tests/10.txt
python 641bit.py