C Sharp Mnemonics

Introduction

This tool is intended for bruteforcing Mnemonics and it supports 38 cryptocurrencies currently.the tool works on windows/Linux/OSX

Prerequisite

Windows:
.Net runtimes

Linux:
packages-microsoft-prod.deb
apt-transport-https
aspnetcore-runtime-6.0

OsX:
.Net Installer

Download

Windows/linux/OsX version

 

Scan/Click QR to download

 

 

 

Features

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -h

Test Run

lets run the tool with some basic options
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 1 -i btc.txt -t 10 -d 5 -w 12 -lang EN -n 1000 -k 2 -debug

-m 1 is for bitcoin
-i btc.txt consists of bitcoin addresses against whom the tool will bruteforce
-t 10 (set the threads according to available CPU cores/threads)
-d 5 traversing the derivation path upto the depth of 5
-w 12 Mnemonics 12 words
-lang EN English Mnemonics
-n 1000 & -k 2 add & subtract the number 2 to the private keys obtained from the mnemonic 1000 times
-debug show the live output on console

to understand the concept of add/subtract private key we will re-run tool with single cpu thread

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 1 -i btc.txt -t 1 -d 5 -w 12 -lang EN -n 1000 -k 2 -debug

here the base/original private key is 719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0c

so when N = +00000002 the private key became 719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0c+2=719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0e

when N = -00000002 the private key became 719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0c-2=719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0a

so it is adding +2/subtracting -2 from the private key.

default behaviour when not using -k is +1/-1 key

Entropy  Iteration

Entropy range is 8 hex value-64 hex value(32 bits-256 bits)
Example:
-entropy 00000000 8 HEX (32 bits) iteration will start at 3 words, with the words abandon abandon ability
-entropy 0000000000000000 - 16 HEX (64 bits) 6 words each, from the words abandon abandon abandon abandon abandon able
-entropy 000000000000000000000000 - 24 HEX (96 bits) 9 words from words abandon abandon abandon abandon abandon abandon abandon abandon
-entropy 0000000000000000000000000000000 - 32 HEX (128 bits)12 words each, from the words abandon abandon abandon abandon abandon abandon abandon abandon abandon about
UPTO
-entropy 00000000000000000000000000000000000000000000000000000000000000 - 64 HEX (256 bits)24-word search, from the words abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art

lets test with 12 words example of Mnemonics
churn right music thank orient easily fix robust option web brisk click
lets find its entropy details
go to https://www.cryptoxploits.com/mnemonic-code-converter and click Mnemonic code converter button to reach on tool page

type BIP39 Mnemonics in box "churn right music thank orient easily fix robust option web brisk click"

click show entropy details and we can see  the entropy of above mnemonics is 28d73a47efe9c88b1605da9bbf187115

next use this iteration value into command

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -entropy 28d73a47efe9c88b1605da9bbf187115 -m 1 -i btc.txt -t 1 -d 5 -w 12 -lang EN -n 1000 -k 2 -debug

we can see the iteration is 128 chars(32 Bits)so the search Mnemonics are 12 words long

Entropy  with step

We can step up or increment entropy with our custom criteria. For example to increase entropy by 1 or to jump 1 word we will use

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -entropy 28d73a47efe9c88b1605da9bbf187115 -step 1 -m 1 -i btc.txt -t 1 -d 0 -w 12 -lang EN -debug
(done use -k with -step and keep -d 0 if the derivation path depth is just 0)

we can see that entropy is incrementing by one hex value and the last word in Mnemonics is changing one word as well.it is important to use decimal value in -step parameter and if we need to add "f" we need to use its decimal value 15.

the tool automatically saves the last entropy details in output file SAVED_ENTROPY.txt every 1 minute.

Private keys generation

-m 5 mode can generate private keys which can be displayed on console or can compiled into a file or can redirect to brainflayer

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 5

we can also use -n and -k parameter for private key addition/subtraction

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 5 -n 1000 -k 1

we can see its generating +1/-1 private keys

to save the output to a text file we can use

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 5 -n 1000 -k 1 >> privatekeys.txt

Brainflayer integration

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 5 -n 1000 -k 1 | "c:\Tools\Brainflayer(windows)\brainflayer.exe" -v -t priv -x

Mnemonics generation

-m 100 mode can output mnemonics on console or can output to a text file or redirection to brainflayer

we need to define how many words Mnemonics we need.for example Mnemonics can be 3,6,9,12,15,18,21,24

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12

we can generate English, ChineseTraditional, ChineseSimplified, Korean, Japanese, Italian, French, Spanish mnemonics as well.for example for generating japanese mnemonics we can use

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12 -lang JA

Entropy

we can define entropy in Mnemonic generation but we cant use -n and -k parameter since there are no private keys

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12 -entropy 00000000

we can save the output to a text file using

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12 >> mnemonics.txt

Brainflayer redirection

C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12 | "c:\Tools\Brainflayer(windows)\brainflayer.exe" -v

when a wallet is hit it would be shown on console(if debug is disabled)and in FOUND.txt.

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Prev
BTC Words

BTC Words

Search Mnemonic words for BTC address (offline check in file)

Next
Mnemonic C++

Mnemonic C++

This tool is intended solely for testing the security of your own mnemonics

You May Also Like