This tool is intended solely for testing the security of your own mnemonics and/or identifying other vulnerabilities to ensure secure access to cryptocurrencies. We can define custom derivation paths,custom 2048 words mnemonic words list,redirect third party generators on the fly.it will filter invalid mnemonics as well.it will save found hashes directly as cryptocurrency address. We can search for 3,6,9,12,15,18,21,24 words mnemonics. The mnemonics can be in English, ChineseTraditional, ChineseSimplified, Korean, Japanese, Italian, French, Spanish languages.
Scan/Click QR to download
1.we need to define custom paths in der.txt.by default there are few custom derivation paths defined in text file.you can add more entries one path by one line
2.address to hash160
3.hash160 to bloom filter
make a custom text file with btc or other crypto addresses and save as btc.txt
C:\Tools\Mnemonic_CPP\win-x64>base58_bech32_to_hash160.exe btc.txt
C:\Tools\Mnemonic_CPP\win-x64>hex_to_bloom.exe -i btc.txt -b btc
by default the capacity is 30000000 lines per bloom.we can customize it upto 38000000 lines(dont go beyond this in single bloom filter).this will create a btc.blf file.
C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -h
C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c cus -d der.txt -b btc.blf -w 12 -t 10
-c cus(compressed/uncompressed/segwit)
-d custom derivation file
-b btc bloom filter file.we can supply multiple -b arguments followed by multiple bloom filter files
-w 12 twelve words mnemonics
-t 10 CPU threads 10
we can redirect the out of third party Mnemonics generator to the tool on the fly
we will use c#mnemonic tool to see how it works
C:\Tools\Mnemonic_CPP\win-x64>C#-Mnemonic.exe -m 100 | MnemonicC.exe -c cus -d der.txt -b btc.blf -w 12 -t 10 -in
here -in parameter is intended for taking input from external generators.
lets generate 12 words mnemonics and store in a text file
C:\Tools\Mnemonic_CPP\win-x64>C#-Mnemonic.exe -m 100 >> mnemonics.txt
C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c cus -d der.txt -b btc.blf -t 10 -in -f mnemonics.txt -save
-f paramenter is for input file containing mnemonics and -save will save hashes as addresses upon hit
we can perform same operation on ethereum and solana with switches -c e & -c S
C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c e -d der.txt -b btc.blf -t 10 -in -f mnemonics.txt -save
C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c S -d der.txt -b btc.blf -t 10 -in -f mnemonics.txt -save
C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c cusexS -d der.txt -b btc.blf -in -f mnemonics.txt -entropy -n 5 -step 1
here after each 5 counts the iteration of entropy will increase by 1l
we can use custom dictionaries with the tool like.korean/spanish/chinese bip39 wordlists.
C:\Tools\Mnemonic_CPP\win-x64>MnemonicC.exe -c cusexS -d der.txt -b btc.blf -in -f mnemonics.txt -entropy -n 5 -step 1 -custom korean.txt