This tool is intended for bruteforcing Mnemonics and it supports 38 cryptocurrencies currently.the tool works on windows/Linux/OSX
Windows:
.Net runtimes
Linux:
packages-microsoft-prod.deb
apt-transport-https
aspnetcore-runtime-6.0
OsX:
.Net Installer
Windows/linux/OsX version
Scan/Click QR to download
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -h
lets run the tool with some basic options
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 1 -i btc.txt -t 10 -d 5 -w 12 -lang EN -n 1000 -k 2 -debug
-m 1 is for bitcoin
-i btc.txt consists of bitcoin addresses against whom the tool will bruteforce
-t 10 (set the threads according to available CPU cores/threads)
-d 5 traversing the derivation path upto the depth of 5
-w 12 Mnemonics 12 words
-lang EN English Mnemonics
-n 1000 & -k 2 add & subtract the number 2 to the private keys obtained from the mnemonic 1000 times
-debug show the live output on console
to understand the concept of add/subtract private key we will re-run tool with single cpu thread
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 1 -i btc.txt -t 1 -d 5 -w 12 -lang EN -n 1000 -k 2 -debug
here the base/original private key is 719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0c
so when N = +00000002 the private key became 719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0c+2=719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0e
when N = -00000002 the private key became 719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0c-2=719355684e4ec6c66cebbc6e577e240765d5b938976b670630a62b4575fd2b0a
so it is adding +2/subtracting -2 from the private key.
default behaviour when not using -k is +1/-1 key
Entropy range is 8 hex value-64 hex value(32 bits-256 bits)
Example:
-entropy 00000000 8 HEX (32 bits) iteration will start at 3 words, with the words abandon abandon ability
-entropy 0000000000000000 - 16 HEX (64 bits) 6 words each, from the words abandon abandon abandon abandon abandon able
-entropy 000000000000000000000000 - 24 HEX (96 bits) 9 words from words abandon abandon abandon abandon abandon abandon abandon abandon
-entropy 0000000000000000000000000000000 - 32 HEX (128 bits)12 words each, from the words abandon abandon abandon abandon abandon abandon abandon abandon abandon about
UPTO
-entropy 00000000000000000000000000000000000000000000000000000000000000 - 64 HEX (256 bits)24-word search, from the words abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon art
lets test with 12 words example of Mnemonics
churn right music thank orient easily fix robust option web brisk click
lets find its entropy details
go to https://www.cryptoxploits.com/mnemonic-code-converter and click Mnemonic code converter button to reach on tool page
type BIP39 Mnemonics in box "churn right music thank orient easily fix robust option web brisk click"
click show entropy details and we can see the entropy of above mnemonics is 28d73a47efe9c88b1605da9bbf187115
next use this iteration value into command
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -entropy 28d73a47efe9c88b1605da9bbf187115 -m 1 -i btc.txt -t 1 -d 5 -w 12 -lang EN -n 1000 -k 2 -debug
we can see the iteration is 128 chars(32 Bits)so the search Mnemonics are 12 words long
We can step up or increment entropy with our custom criteria. For example to increase entropy by 1 or to jump 1 word we will use
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -entropy 28d73a47efe9c88b1605da9bbf187115 -step 1 -m 1 -i btc.txt -t 1 -d 0 -w 12 -lang EN -debug
(done use -k with -step and keep -d 0 if the derivation path depth is just 0)
we can see that entropy is incrementing by one hex value and the last word in Mnemonics is changing one word as well.it is important to use decimal value in -step parameter and if we need to add "f" we need to use its decimal value 15.
the tool automatically saves the last entropy details in output file SAVED_ENTROPY.txt every 1 minute.
-m 5 mode can generate private keys which can be displayed on console or can compiled into a file or can redirect to brainflayer
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 5
we can also use -n and -k parameter for private key addition/subtraction
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 5 -n 1000 -k 1
we can see its generating +1/-1 private keys
to save the output to a text file we can use
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 5 -n 1000 -k 1 >> privatekeys.txt
Brainflayer integration
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 5 -n 1000 -k 1 | "c:\Tools\Brainflayer(windows)\brainflayer.exe" -v -t priv -x
-m 100 mode can output mnemonics on console or can output to a text file or redirection to brainflayer
we need to define how many words Mnemonics we need.for example Mnemonics can be 3,6,9,12,15,18,21,24
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12
we can generate English, ChineseTraditional, ChineseSimplified, Korean, Japanese, Italian, French, Spanish mnemonics as well.for example for generating japanese mnemonics we can use
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12 -lang JA
Entropy
we can define entropy in Mnemonic generation but we cant use -n and -k parameter since there are no private keys
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12 -entropy 00000000
we can save the output to a text file using
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12 >> mnemonics.txt
Brainflayer redirection
C:\Tools\C-Sharp-Mnemonic>C#-Mnemonic.exe -m 100 -w 12 | "c:\Tools\Brainflayer(windows)\brainflayer.exe" -v
when a wallet is hit it would be shown on console(if debug is disabled)and in FOUND.txt.