Title: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: cum0verflow on December 21, 2017, 07:49:51 PM Hey Bitcointalk :)
This is actually my first topic here and i want to share something with you. How does it work: The Code i share with you here just generates random private keys and then calculates the public address for that private key. After that it checks if the address calculated is in a list. If there is a match the privatekey will get converted to WIF and will be written in a seperate file. How are the chances?: Chances that you do actually find the privatekey of an address in the list i will provide you are actually very low. Very low meaning a chance of 1/(2^160) each iteration. But you can let the process run in the background since the cpu usage souldnt be that high. Source: Code: import java.io.File; I have posted a list of every address containing 1BTC or more here: https://gist.github.com/anonymous/d0fb1677bdcd28d60f4374301f7a245c How to set up: -compile the Source i have given to you as jar file -create a folder containing: -the jar file, -a list with the addresses you want to crack and name it "Addys.txt" -an empty text file called "PrivateKeys.txt". Here youll find the cracked p-keys -now you are ready to run the jar For the lazy guys: i have compiled the source, wrapped it with launch4j to an .exe file and made a pretty icon for it. The download link below does also contain any files needed to run. Note: -The zip file blelow does also contain a .bat file to add the program to AutoStart. For that to work you have to extract the zip directly into C: So the path for your binary should be: C:/BitcoinLottery/BitcoinLottery.exe -The exe file doesnt start a console, so you might not be able to tell if it started correctly. Just check the Task manager for running Java Applications and you will be able to tell if its running. Download: http://www.mediafire.com/file/96w3sd4dkszs6o0/BitcoinLottery.zip I would appreciate a small donation since i have recently lost my wallet with above 100k worth of bitcoins :'( My new address: 1Cd5KxBJ5cAQPF3S7DtTcgfCUyioG5tbJx Thank you :) GOOD LUCK! Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: jhdscript on December 21, 2017, 07:56:17 PM It s very similar to http://pool.bitcoinvanity.com:8910/ (http://pool.bitcoinvanity.com:8910/)
Your source code isn t performant. Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: cum0verflow on December 21, 2017, 08:07:00 PM It s very similar to http://pool.bitcoinvanity.com:8910/ (http://pool.bitcoinvanity.com:8910/) Ouh thanks didnt know that site before. Your source code isn t performant. I know :) but was too lazy to clean it up. I think you could do that yourself if you want but really do 1000 iterations more or less really matter? I mean at the best it raises your chances by an atomic amount. In the end it is really just luck :) Thanks for taking the time to read my topic tho. Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: jhdscript on December 21, 2017, 08:18:03 PM It s very similar to http://pool.bitcoinvanity.com:8910/ (http://pool.bitcoinvanity.com:8910/) Ouh thanks didnt know that site before. Your source code isn t performant. I know :) but was too lazy to clean it up. I think you could do that yourself if you want but really do 1000 iterations more or less really matter? I mean at the best it raises your chances by an atomic amount. In the end it is really just luck :) Thanks for taking the time to read my topic tho. For for sharing source code with community :) Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: bitcoinfuck on December 21, 2017, 09:55:52 PM import org.spongycastle.asn1.sec.SECNamedCurves;
import org.spongycastle.asn1.x9.X9ECParameters; import org.spongycastle.crypto.digests.RIPEMD160Digest; import org.spongycastle.crypto.params.ECDomainParameters; import org.spongycastle.math.ec.ECPoint; can you link these imports ? Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: civilufo on December 21, 2017, 09:59:48 PM Looks promising, although there was such tool in the market, but it is good to have more. Thanks for sharing.
Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: bitcoinfuck on December 21, 2017, 10:01:48 PM OP can you explain this
https://www.virustotal.com/#/file/3f7574765ff3f4d2c5bc0f6f4a11932b733b19bc9d3f5c2299a93d390154dec9/detection Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: bitcoinfuck on December 21, 2017, 10:03:30 PM Looks promising, although there was such tool in the market, but it is good to have more. Thanks for sharing. can you send me a link, which tool that you refer here Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: jhdscript on December 21, 2017, 11:21:09 PM OP can you explain this https://www.virustotal.com/#/file/3f7574765ff3f4d2c5bc0f6f4a11932b733b19bc9d3f5c2299a93d390154dec9/detection It s a false positive Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: bitcoinfuck on December 21, 2017, 11:27:48 PM OP can you explain this https://www.virustotal.com/#/file/3f7574765ff3f4d2c5bc0f6f4a11932b733b19bc9d3f5c2299a93d390154dec9/detection It s a false positive do you have it running then ? Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: cum0verflow on December 22, 2017, 12:58:16 AM OP can you explain this https://www.virustotal.com/#/file/3f7574765ff3f4d2c5bc0f6f4a11932b733b19bc9d3f5c2299a93d390154dec9/detection Dont know to be honest. Feel free to reverse or just compile it yourself if you dont trust me :) Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: cum0verflow on December 22, 2017, 01:21:00 AM import org.spongycastle.asn1.sec.SECNamedCurves; sure :) import org.spongycastle.asn1.x9.X9ECParameters; import org.spongycastle.crypto.digests.RIPEMD160Digest; import org.spongycastle.crypto.params.ECDomainParameters; import org.spongycastle.math.ec.ECPoint; can you link these imports ? here you go buddy: (!DIRECT LINK!) http://search.maven.org/remotecontent?filepath=com/madgag/spongycastle/core/1.58.0.0/core-1.58.0.0.jar Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: NewBitcoinBaron on January 02, 2018, 04:03:59 AM I downloaded your tool and let it run for some days now.
I just checked my privatekeys file and there was just added an entry. I sweeped the privatekey using electrum and it had 50btc in it !!!!! I just registered to thank you soooo much cant belive it! Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: e4f4 on January 02, 2018, 11:28:26 PM Words without pictures and no transactions...
21 century - even dogs have phones and youtube accounts. Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: holy_ship on January 04, 2018, 06:37:04 AM Let me guess the speed - about 10k keys per second per thread? (that's what I got on my java-version)
I myself is a huge fan of java (esp EE), but it really SUX on this task. vanitygen is about 60 (yeah, sixty) times faster. I was hoping to get usual slowness of 10-20-30 percent, but not 60 times. Do you have an interest to make use of OpenCL ? It should speed things up. But oclvanitygen is also faster (5 million keys per second per core easy) :( Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: vitalyxx on January 04, 2018, 09:21:55 AM i will keep it running for a couple days and see what happen, thank for contributing the code to the community
Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: Goldjunge45 on February 23, 2018, 09:39:27 PM Fake!!!
Virus, Bitcoinadresse wird bei dem kopieren der eigenen durch den Virus ersetzt. Virus Adresse: 1Drz6wNEsw8s4yRxGSsz2fiYVM26N9m49K. Fake, Finger weg!!! Goldjunge45 Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: cypherion on February 26, 2018, 02:51:45 PM Hi Bitcointalk!
I'm not good at java and crypto algorithms, but I wanted to check how the author's code works and in addition .EXE the file looks suspicious. Maybe because I'm not so lazy, sorry about that. I didn't change anything in the original code just added (System.out.println) the output of some information to the console, that's all, becauce I want to see what the values genereting code. Source: Code: import java.io.File; How I tried to set up (Windows OS): - compile the Source -- downloaded and installed JDK (http://www.oracle.com/technetwork/java/index-jsp-138363.html) -- downloaded Spongy Castle (http://rtyley.github.io/spongycastle/#downloads) and copied jar(s) to the ..\Java\jdk1.8.0\jre\lib\ext\ directory -- created folder BitcoinLottery (on desktop for example) containing 2 files within "BitcoinLottery.java" and "Manifest.txt", into the "BitcoinLottery.java" file pasted code from top, into the "Manifest.txt" pasted Code: Main-class: BitcoinLottery Code: javac C:\Users\USER_NAME\Desktop\BitcoinLottery\BitcoinLottery.java Code: jar cfvm C:\Users\USER_NAME\Desktop\BitcoinLottery\BitcoinLottery.jar C:\Users\USER_NAME\Desktop\BitcoinLottery\Manifest.txt C:\Users\USER_NAME\Desktop\BitcoinLottery\BitcoinLottery.class -- run the last commnad into console: java -jar C:\Users\USER_NAME\Desktop\BitcoinLottery\BitcoinLottery.jar If everythings all right you could see something like that: http://i67.tinypic.com/9uqagk.jpg I don't know is that correctly works, i mean methods and algorithms, but generation values happen. It somehow works. Note: - The zip file blelow does contain all components for start. Before run "BitcoinLottery.jar" in console, computer need to has JRE (http://"http://www.oracle.com/technetwork/java/index-jsp-138363.html") Download: https://sundryfiles.com/3wg (https://sundryfiles.com/3wg) References: http://www.bouncycastle.org/documentation.html (http://www.bouncycastle.org/documentation.html) Tutorial on how to make a Java JAR file with the command prompt (https://www.youtube.com/watch?v=WTfjbOIfi10) P.S.: I'm not native English speaker and hope you'll not have any problems with reading and running. Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: Goldjunge45 on February 26, 2018, 05:34:49 PM Fake!!!
Virus, bitcoin address is replaced when copying your own by the virus. Virus Address: 1Drz6wNEsw8s4yRxGSsz2fiYVM26N9m49K. Fake, fingers away !!! Goldjunge45 Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: cum0verflow on January 09, 2019, 12:52:01 AM Fake!!! its not fake the algos do work. I know the code is kind of bad but i know the maths behind it and tried to implement them. The source code is clean, i can guarantee for that. Virus, bitcoin address is replaced when copying your own by the virus. Virus Address: 1Drz6wNEsw8s4yRxGSsz2fiYVM26N9m49K. Fake, fingers away !!! Goldjunge45 Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: DeeGee on April 01, 2020, 01:29:42 PM cypherion would it be possible to reshare your compiled file again for download please?
Title: Re: [Release][Source] BitcoinLottery (Bitcoin Brute Force Cracking Tool in Java) Post by: ashraful1980 on September 28, 2020, 06:40:33 PM Hi Bitcointalk! I'm not good at java and crypto algorithms, but I wanted to check how the author's code works and in addition .EXE the file looks suspicious. Maybe because I'm not so lazy, sorry about that. I didn't change anything in the original code just added (System.out.println) the output of some information to the console, that's all, becauce I want to see what the values genereting code. Source: Code: import java.io.File; How I tried to set up (Windows OS): - compile the Source -- downloaded and installed JDK (http://www.oracle.com/technetwork/java/index-jsp-138363.html) -- downloaded Spongy Castle (http://rtyley.github.io/spongycastle/#downloads) and copied jar(s) to the ..\Java\jdk1.8.0\jre\lib\ext\ directory -- created folder BitcoinLottery (on desktop for example) containing 2 files within "BitcoinLottery.java" and "Manifest.txt", into the "BitcoinLottery.java" file pasted code from top, into the "Manifest.txt" pasted Code: Main-class: BitcoinLottery Code: javac C:\Users\USER_NAME\Desktop\BitcoinLottery\BitcoinLottery.java Code: jar cfvm C:\Users\USER_NAME\Desktop\BitcoinLottery\BitcoinLottery.jar C:\Users\USER_NAME\Desktop\BitcoinLottery\Manifest.txt C:\Users\USER_NAME\Desktop\BitcoinLottery\BitcoinLottery.class -- run the last commnad into console: java -jar C:\Users\USER_NAME\Desktop\BitcoinLottery\BitcoinLottery.jar If everythings all right you could see something like that: http://i67.tinypic.com/9uqagk.jpg I don't know is that correctly works, i mean methods and algorithms, but generation values happen. It somehow works. Note: - The zip file blelow does contain all components for start. Before run "BitcoinLottery.jar" in console, computer need to has JRE (http://"http://www.oracle.com/technetwork/java/index-jsp-138363.html") Download: https://sundryfiles.com/3wg (https://sundryfiles.com/3wg) References: http://www.bouncycastle.org/documentation.html (http://www.bouncycastle.org/documentation.html) Tutorial on how to make a Java JAR file with the command prompt (https://www.youtube.com/watch?v=WTfjbOIfi10) P.S.: I'm not native English speaker and hope you'll not have any problems with reading and running. Hi, I was converted the BitcoinLottery.java to BitcoinLottery.py as bellow. It was found some error massage; somebody help to modify for working accurately. #!/usr/bin/env python """ generated source for module HelloWorld """ from __future__ import print_function class BitcoinLottery(object): """ generated source for class BitcoinLottery """ BitcoinAddressen = File("Addys.txt") genPrivateKey = None privateKeyNumber = None publicKey = [] genAddy = None EC_PARAMS = None BASE58_CHUNK_MOD = BigInteger.valueOf(0x5fa8624c7fba400L) BASE58_CHUNK_DIGITS = 10 BASE58 = "123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz".toCharArray() # private static int Counter = 0; # Generate Curve for Eliptic Curve Algo: params = SECNamedCurves.getByName("secp256k1") @classmethod def main(cls, args): """ generated source for method main """ while True: # print("Iteration no:" + Counter); AddressStream = Scanner(cls.BitcoinAddressen) # Generate new privatekey and convert it to hex cls.privateKeyNumber = BigInteger(256, Random()) # random generation # Generate PublicKey to calculate Address from: uncompressed = cls.EC_PARAMS.getG().multiply(cls.privateKeyNumber) cls.publicKey = uncompressed.getEncoded(False) # Generate Bitcoin-Address: try: hashedPublicKey = sha256ripemd160(cls.publicKey) addressBytes = [None] * 4 + len(hashedPublicKey) addressBytes[0] = int((0)) System.arraycopy(hashedPublicKey, 0, addressBytes, 1, ) digestSha = MessageDigest.getInstance("SHA-256") digestSha.update(addressBytes, 0, len(addressBytes)) check = digestSha.digest(digestSha.digest()) System.arraycopy(check, 0, addressBytes, len(hashedPublicKey), 4) cls.genAddy = encodeBase58(addressBytes) except NoSuchAlgorithmException as e: pass # Check if Address is in our List: while AddressStream.hasNextLine(): if AddressStream.nextLine() == cls.genAddy: print("!!!!SUCCESS!!!!") # Convert PrivateKey to Wallet Input Format: cls.genPrivateKey = cls.privateKeyNumber.toString(16) cls.genPrivateKey = "80" + cls.genPrivateKey try: digestSha = MessageDigest.getInstance("SHA-256") hash = digestSha.digest(cls.genPrivateKey.getBytes(StandardCharsets.UTF_8)) hash = digestSha.digest(hash) checksum = "" i = 1 while i < 5: checksum = checksum + hash i += 1 cls.genPrivateKey = cls.genPrivateKey + checksum cls.genPrivateKey = encodeBase58(cls.genPrivateKey.getBytes(StandardCharsets.UTF_8)) writeStuffToFile() except NoSuchAlgorithmException as e: writeStuffToFile() AddressStream.close() @classmethod def writeStuffToFile(cls): """ generated source for method writeStuffToFile """ try: Info = "Private Key: " + cls.privateKeyNumber + " HEX: " + cls.privateKeyNumber.toString(16) + " WIF: " + cls.genPrivateKey Files.write(Paths.get("PrivateKeys.txt"), Info.getBytes(), StandardOpenOption.APPEND) except IOError as e: print("KEY FOUND BUT THERE WAS A PROBLEM WRITING TO FILE!:") print("Private Key: " + cls.privateKeyNumber + " HEX: " + cls.privateKeyNumber.toString(16)) print("WIF: " + cls.genPrivateKey) print() @classmethod def encodeBase58(cls, input): """ generated source for method encodeBase58 """ if input == None: return None str_ = StringBuilder((len(input)) / 256 + 1) bn = BigInteger(1, input) rem = long() while True: divideAndRemainder = bn.divideAndRemainder(cls.BASE58_CHUNK_MOD) bn = divideAndRemainder[0] rem = divideAndRemainder[1].longValue() if bn.compareTo(BigInteger.ZERO) == 0: break i = 0 while i < cls.BASE58_CHUNK_DIGITS: str_.append(cls.BASE58[int((rem % 58))]) rem /= 58 i += 1 while rem != 0: str_.append(cls.BASE58[int((rem % 58))]) rem /= 58 str_.reverse() nLeadingZeros = 0 while input[nLeadingZeros] == 0 and len(input): str_.insert(0, cls.BASE58[0]) nLeadingZeros += 1 return str_.__str__() @classmethod def sha256ripemd160(cls, publicKey): """ generated source for method sha256ripemd160 """ try: sha256 = MessageDigest.getInstance("SHA-256") sha256hash = sha256.digest(publicKey) ripemd160Digest = RIPEMD160Digest() ripemd160Digest.update(sha256hash, 0, ) hashedPublicKey = [None] * 20 ripemd160Digest.doFinal(hashedPublicKey, 0) return hashedPublicKey except NoSuchAlgorithmException as e: raise RuntimeException(e) |