0% found this document useful (0 votes)
1K views2 pages

Manual

The document provides commands and instructions for analyzing, cracking, and recovering bitcoin wallet files and private keys using various cryptocurrency forensic tools including hashcat, btcrecover, keyhunt, kangaroo, bitcrack, lostcoins, and bsgscudaht. It explores techniques like brute force cracking, dictionary attacks, and vanity address generation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views2 pages

Manual

The document provides commands and instructions for analyzing, cracking, and recovering bitcoin wallet files and private keys using various cryptocurrency forensic tools including hashcat, btcrecover, keyhunt, kangaroo, bitcrack, lostcoins, and bsgscudaht. It explores techniques like brute force cracking, dictionary attacks, and vanity address generation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

cd C:\Users\User\Desktop\hashcat-6.1.

1
AAF9CA1E7A9A6CF979977CB248C175A2057088AC50C30000000000001976A914948E
python bitcoin2jhon.py wallet.dat
hashcat.exe --help
hashcat.exe --opencl-info
hashcat.exe --benchmark
hashcat.exe -b -m 11300
hashcat.exe -a 3 -m 1400 hash.txt ?a?a?a?a?a?a?a?a?a?a?a?a?a?a --force -t 2
hashcat -a 0 -m 11300 hash.txt F:\cms\hashcat-6.2.4\masks --force -D 2
hashcat.exe -m 11300 -a 3 hash.txt dictionary.txt --force -D 2
hashcat.exe -m 11300 -a 0 hash.txt lab1 --force -D 2
hashcat.exe -m 11300 -a 3 hash.txt --stdout
hashcat.exe -a 3 -m 11300 hash.txt -i --increment-min=8 --increment-max=9 R, ukl?
a? a? a? a? a? a --force -D 2
hashcat.exe -a 3 -m 11300 hash.txt -i --increment-min=8 --increment-max=8 R, u, k,
l? a? a? a? a? a?
hashcat.exe -a 3 -w 3 -m 11300 -i --increment-min=13 --increment-max=13
$bitcoin$64$aea1763feebbb4cfbaf4d061333288baf55d204b62c9138c48dcf2e83d8fa84c$16$a09
f04ca2f8495f5$25000$2$00$2$00 ilovebitcoin?a -D 2 --quiet --potfile-disable

###################################################################################
###################################
cd C:\btcrecover-master
C:\Python27\python btcrecover.py --tokenlist token.txt --listpass
C:\Python27\python btcrecover.py --wallet wallet.dat --tokenlist token.txt
--autosave save.txt
python bitcoin-balance-checker.py
VanitySearch.exe -i wallet.txt -o 9.txt -t 2
VanitySearch.exe -s "AliceSeed" -kp
VanitySearch.exe -sp
028d26200250cebdae120ef31b04c80cd50d4cddc8eadbcf29fc696d32c0ade462 -t 0 -gpu -stop
-o keyinfo.txt 13zb1hQbWVsc2S
BitCrack64.exe -i wallet.txt -o 2.txt -t 2
python bitcoin-balance-checker.py list-addresses.txt
oclvanitygen.exe -k -o C:\Users\User\Desktop\2323\1.txt 1Bitcoin
keyconv.exe -k -o C:\Users\User\Desktop\2323\1.txt 1Bitcoin
keyhunt.exe -t 4 -m bsgs -f pu.txt -k 128 -r
2684c2e58e9b04570f1fd000000000:ffffffffffffffffffffffffffffff -R
keyhunt.exe -t 10 -m address -f 1.txt -k 4 -b 160 -R
keyhunt.exe -t 2 -m rmd160 -f 64.rmd -k 32 -r 6abe1f9a36b414:7fffffffffffff
keyhunt.exe -t 4 -m bsgs -f 1.txt -n 0x1000000000000000000 -k 4 -256 -s 10
keyhunt.exe -t 4 -m address -f addresses.txt -r 1:FFFFFFFF -M -n 8 -B random
keyhunt.exe -t 4 -m bsgs -f 1.txt -M -s 10 -S -k 4 -b 256
keyhunt.exe -t 10 -m address -f 1.txt -n 0x1000000000000000000 -M -s 2 -S -k 128
-b 60
keysubtracter.exe -o 3.txt -r
fd7720f353a4c0a237c32b16cfd7720df321b9c373404d89bb634bdf100d29ca:ffffffffffffffffff
fffffffffffffebaaedce6af48a03bbfd25e8cd0364140 -n 10000000 -p
0379be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798 -R
keyhunt.exe -m xpoint -f tests/8.txt -n 65536 -t 4 -b 60 -R
keyhunt.exe -m address -t 6 -l compress -r 1:3fffffff -v
15JhYXn6Mx3oF4Y7PcTAv2wVVAuCF
keyhunt.exe -m rmd160 -f tests/puzzleswopublickey.txt -t 2 -r 1: 3fffffff
keyhunt.exe -m address -l compress -R -b 66 -v tests/10.txt

python publickey_to_addressB58.py pubkeys_in.txt addresses.txt

keysubtracter.exe -o 11.txt -b 50 -n 1000000 -p


03f46f41027bbf44fafd6b059091b900dad41e6845b2241dc3254c7cdd3c5a16c6
Kangaroo.exe -t 0 -gpu -gpuId 0 -w save.work -wsplit -wi 10
C:\Kangaroo\VC_CUDA8\in64.txt

python 641bit.py

VanitySearch-1.15.4_bitcrack_th256gr.exe -gpu 0 -i wallet.txt -c -u --keyspace


174a965abdbeb6cf872583ee0fd440275d547aabea14b9fe6da5ce17e12911:174a965abdbeb6cf8725
83ee0fd440275d547aabea14b9ffd0eb46756b2911 -p 224 --continue 12.txt
Kangaroo.exe -t 2 -o 2.txt in.txt
cuBitCrack.exe -i au.txt -o 2.txt -c -u --keyspace
3fffffff:ffffffffffffffffffffffffffffff --continue 12.txt
clAltCrack.exe -i add.txt -o 5.txt -c -u --keyspace
174a965abdbeb6cf872583ee0fd440275d547aabea14b9fe6da5ce17e12911:174a965abdbeb6cf8725
83ee0fd440275d547aabea14b9ffd0eb46756b2911 -p 224 --continue 12.txt
clBitCrack.exe -i keyhunt.exe.txt -o 1.txt -c -u --keyspace
4000000000000000000000000000000000000000000000000000000000000000:800000000000000000
0000000000000000000000000000000000000000000000 -p 1024 --continue 2.txt
clPubCrack.exe -t 32 -i in.txt -o 5.txt -c -u --keyspace
0238e2c3f768bf595754d3ffffffff:07ffffffffffffffffffffffffffff --continue 12.txt -r
clPubCrack.exe -c -u
030d282cf2ff536d2c42f105d0b8588821a915dc3f9a05bd98bb23af67a2e92a5b -o 1.txt
--keyspace 20000000:3fffffff -p 2048
clBitCrack.exe 1LHtnpd8nU5VHEMkG2TMYYNUjjLc992bps -o 1.txt --keyspace
20000000:3fffffff -p 2048

b58dec.exe ac.txt address.bin


RMD160-Sort.exe address.bin add.bin
LostCoins.exe -t 0 -g -i 0 -x 64,32 -f add.bin -r 6 -n 120
LostCoins.exe -t 2 -f add.bin -r 1 -n 256 -d 0
LostCoins.exe -t 0 -g -i 0 -x 64,32 -f test.bin -r 6 -n 120
.\LostCoins.exe -t 2 -f addres.bin -r 8 -n 5 -d 0
KeyHunt-Cuda.exe -t 0 -g --gpui 0 --gpux 128,128 -m bsgs --coin BTC --range
800000000000000:fffffffffffffff
0348e843dc5b1bd246e6309b4924b81543d02b16c8083df973a89ce2c7eb89a10d

bsgscudaHT_1_7_3.exe -pk 0x1000 -pke 0xffffffffff -infile puu.txt -t 512 -b 112 -p


978 -w 28 -htsz 27
pause

You might also like