Mnemonic C++

Introduction

This tool is intended solely for testing the security of your own mnemonics and/or identifying other vulnerabilities to ensure secure access to cryptocurrencies. We can define custom derivation paths,custom 2048 words mnemonic words list,redirect third party generators on the fly.it will filter invalid mnemonics as well.it will save found hashes directly as cryptocurrency address. We can search for 3,6,9,12,15,18,21,24 words mnemonics. The mnemonics can be in English, ChineseTraditional, ChineseSimplified, Korean, Japanese, Italian, French, Spanish languages.

Download

 

Scan/Click QR to download

 

 

 

Preparation

1.we need to define custom paths in der.txt.by default there are few custom derivation paths defined in text file.you can add more entries one path by one line

2.address to hash160

3.hash160 to bloom filter

make a custom text file with btc or other crypto addresses and save as btc.txt

C:\Tools\Mnemonic_CPP\win-x64>base58_bech32_to_hash160.exe btc.txt

C:\Tools\Mnemonic_CPP\win-x64>hex_to_bloom.exe -i btc.txt -b btc

by default the capacity is 30000000 lines per bloom.we can customize it upto 38000000 lines(dont go beyond this in single bloom filter).this will  create a btc.blf file.

Options

C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -h

Test Run

C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c cus -d der.txt -b btc.blf -w 12 -t 10

-c cus(compressed/uncompressed/segwit)

-d custom derivation file

-b btc bloom filter file.we can supply multiple -b arguments followed by multiple bloom filter files

-w 12 twelve words mnemonics

-t 10 CPU threads 10

External Mnemonic tool input

we can redirect the out of third party Mnemonics generator to the tool on the fly

we will use c#mnemonic tool to see how it works

C:\Tools\Mnemonic_CPP\win-x64>C#-Mnemonic.exe -m 100 | MnemonicC.exe -c cus -d der.txt -b btc.blf -w 12 -t 10 -in

here -in parameter is intended for taking input from external generators.

Mnemonic file input

lets generate 12 words mnemonics and store in a text file

C:\Tools\Mnemonic_CPP\win-x64>C#-Mnemonic.exe -m 100 >> mnemonics.txt

C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c cus -d der.txt -b btc.blf -t 10 -in -f mnemonics.txt -save

-f paramenter is for input file containing mnemonics and -save will save hashes as addresses upon hit

we can perform same operation on ethereum and solana with switches -c e & -c S

C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c e -d der.txt -b btc.blf -t 10 -in -f mnemonics.txt -save

C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c S -d der.txt -b btc.blf -t 10 -in -f mnemonics.txt -save

Entropy mode

C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c cusexS -d der.txt -b btc.blf -in -f mnemonics.txt -entropy -n 5 -step 1

here after each 5 counts the iteration of entropy will increase by 1l

Custom dictionary+Entropy mode

we can use custom dictionaries with the tool like.korean/spanish/chinese bip39 wordlists.

C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c cusexS -d der.txt -b btc.blf -in -f mnemonics.txt -entropy -n 5 -step 1 -custom korean.txt

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Prev
C Sharp Mnemonics

C Sharp Mnemonics

This tool is intended for bruteforcing Mnemonics and it supports 38

Next
Core decrypt

Core decrypt

this tool is used for recovering bitcoin core wallet

You May Also Like