Bitcoin Forum
January 16, 2026, 01:15:57 AM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: lattice attack  (Read 446 times)
Kostelooscoin (OP)
Member
**
Offline Offline

Activity: 206
Merit: 16


View Profile
February 16, 2023, 11:59:44 AM
 #1

hello someone knows this https://cryptodeeptech.ru/lattice-attack/

because it is impossible to get the program without paying a fortune
sad-error
Newbie
*
Offline Offline

Activity: 27
Merit: 13


View Profile
February 16, 2023, 04:41:57 PM
Merited by vapourminer (1), ABCbits (1)
 #2

This is old news and a complete non-issue. For what it's worth, as far as I'm aware most (if not all) wallets use rfc 6979 to decide on the value of k, which means that as far as we know the randomness completely depends on the randomness of the private key and therefore your mnemonic.
COBRAS
Member
**
Offline Offline

Activity: 1136
Merit: 25


View Profile
February 16, 2023, 08:05:42 PM
 #3

hello someone knows this https://cryptodeeptech.ru/lattice-attack/

because it is impossible to get the program without paying a fortune

codes in moneyforshit style

[
riceberryrice
Newbie
*
Offline Offline

Activity: 3
Merit: 0


View Profile
February 17, 2023, 07:11:18 AM
 #4


https://cryptodeeptech.ru/lattice-attack/
https://cryptodeeptech.ru/twist-attack/
https://github.com/demining/CryptoDeepTools

My opinion, I believe this software attacksafe/CryptoDeepTools , I think this is creating for scam by referencing other research breaks ECDSA for made the scam happen.
attacksafe create for sale(SCAM) who contact them
maybe can possibility to scam, be careful.

noway to use that tools(all) for break


MisterCooper
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
February 17, 2023, 02:25:32 PM
 #5


https://cryptodeeptech.ru/lattice-attack/
https://cryptodeeptech.ru/twist-attack/
https://github.com/demining/CryptoDeepTools

My opinion, I believe this software attacksafe/CryptoDeepTools , I think this is creating for scam by referencing other research breaks ECDSA for made the scam happen.
attacksafe create for sale(SCAM) who contact them
maybe can possibility to scam, be careful.

noway to use that tools(all) for break




Hello. You don't have to worry, there are no viruses in AttackSafe/LatticaAttack/CryptoDeepTools. Verified in Kaspersky Internet Security. Proof! https://cryptodeeptech.ru/doc/Kaspersky-Internet-Security/CRYPTODEEPTECH.gif

https://cryptodeeptech.ru/doc/Kaspersky-Internet-Security/CRYPTODEEPTECH.gif

ymgve2
Full Member
***
Offline Offline

Activity: 162
Merit: 230


View Profile
February 17, 2023, 05:49:16 PM
 #6


https://cryptodeeptech.ru/lattice-attack/
https://cryptodeeptech.ru/twist-attack/
https://github.com/demining/CryptoDeepTools

My opinion, I believe this software attacksafe/CryptoDeepTools , I think this is creating for scam by referencing other research breaks ECDSA for made the scam happen.
attacksafe create for sale(SCAM) who contact them
maybe can possibility to scam, be careful.

noway to use that tools(all) for break




Hello. You don't have to worry, there are no viruses in AttackSafe/LatticaAttack/CryptoDeepTools. Verified in Kaspersky Internet Security. Proof! https://cryptodeeptech.ru/doc/Kaspersky-Internet-Security/CRYPTODEEPTECH.gif





The gifs you made are hosted on the cryptodeeptech domain, which I assume means you work for them.

That's a pretty big conflict of interest and I wouldn't trust you.

Why not release the source of the cryptodeeptools if it's all fine?
sad-error
Newbie
*
Offline Offline

Activity: 27
Merit: 13


View Profile
February 18, 2023, 11:13:33 AM
 #7

https://cryptodeeptech.ru/lattice-attack/
https://cryptodeeptech.ru/twist-attack/
https://github.com/demining/CryptoDeepTools

My opinion, I believe this software attacksafe/CryptoDeepTools , I think this is creating for scam by referencing other research breaks ECDSA for made the scam happen.
attacksafe create for sale(SCAM) who contact them
maybe can possibility to scam, be careful.

noway to use that tools(all) for break
Hello. You don't have to worry, there are no viruses in AttackSafe/LatticaAttack/CryptoDeepTools. Verified in Kaspersky Internet Security. Proof! https://cryptodeeptech.ru/doc/Kaspersky-Internet-Security/CRYPTODEEPTECH.gif

https://cryptodeeptech.ru/doc/Kaspersky-Internet-Security/CRYPTODEEPTECH.gif

Scam doesn't always mean a software contain virus/malware. If you want to convince @riceberryrice, you need to bring better argument.

I don't understand why we are still talking about this - the tool, even if it's not malicious and works as expected - does not actually do anything because there's no attack surface. The whole thing is very obviously an FUD fueled idea of hoping to sell software that does not work.
nagibator777
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
July 02, 2025, 02:03:31 PM
 #8

It's definitely a russian scam.
They sell their scripts at satoshi-files site(don't remember exact address, sounds like this) for a bitcoins.
I've found this script at github. Main linux-executable is named "attacksafe", but other files is python-scripts.
It looks strange, and I've decompiled this executable to python source.
And logic of this script is dumb if-else comparator of predefined txId's to predefined private keys.
Don't be fooled!
Decompiled code:
Code:
# uncompyle6 version 3.9.2
# Python bytecode version base 3.7.0 (3394)
# Decompiled from: Python 3.7.0 (v3.7.0:1bf9cc5093, Jun 26 2018, 23:26:24)
# [Clang 6.0 (clang-600.0.57)]
# Embedded file name: attacksafe.py
import sys
if __name__ == "__main__":
    if "-help" in sys.argv:
        print("  -version:  software version ")
        print("  -list:     list of bitcoin attacks")
        print("  -tool:     indicate the attack")
        print("  -gpu:      enable gpu")
        print("  -time:     work timeout")
        print("  -server:   server mode")
        print("  -port:     server port")
        print("  -open:     open file")
        print("  -save:     save file")
        print("  -search:   vulnerability search")
        print("  -stop:     stop at mode")
        print("  -max:      maximum quantity in mode")
        print("  -min:      minimum quantity per mode")
        print("  -speed:    boost speed for mode")
        print("  -range:    specific range")
        print("  -crack:    crack mode")
        print("  -field:    starting field")
        print("  -point:    starting point")
        print("  -inject:   injection regimen")
        print("  -decode:   decoding mode")
if __name__ == "__main__":
    if "-version" in sys.argv:
        print("Version 5.3.1.   [ATTACKSAFE SOFTWARE, © 2022]")
if __name__ == "__main__":
    if "-list" in sys.argv:
        print("  -tool:   birthday_attack")
        print("  -tool:   blockchain_reorganization_attack")
        print("  -tool:   crime_attack")
        print("  -tool:   the_51_attack")
        print("  -tool:   partial_matching_meet_in_the_middle_attack")
        print("  -tool:   roca_vulnerability_attack")
        print("  -tool:   majority_attack")
        print("  -tool:   side_channel_attack")
        print("  -tool:   frey_ruck_attack")
        print("  -tool:   3_subset_meet_in_the_middle_attack")
        print("  -tool:   distinguishing_attack")
        print("  -tool:   man_in_the_middle_attack")
        print("  -tool:   replay_attack")
        print("  -tool:   brute_force_attack")
        print("  -tool:   collision_attack")
        print("  -tool:   related_key_attack")
        print("  -tool:   microarchitectural_data_sampling_attack")
        print("  -tool:   logjam_attack")
        print("  -tool:   tlbleed_attack")
        print("  -tool:   load_value_injection_attack")
        print("  -tool:   downgrade_attack")
        print("  -tool:   whitebox_attack")
        print("  -tool:   electromagnetic_attack")
        print("  -tool:   the_sybil_attack")
        print("  -tool:   lucky_thirteen_attack")
        print("  -tool:   rowhammer_attack")
        print("  -tool:   fluhrer_mantin_and_shamir_attack")
        print("  -tool:   correlation_attack")
        print("  -tool:   meltdown_attack_security_vulnerability")
        print("  -tool:   breach_attack")
        print("  -tool:   wieners_attack")
        print("  -tool:   biclique_attack")
        print("  -tool:   meet_in_the_middle_attack")
        print("  -tool:   tempest_attack_codename")
        print("  -tool:   drown_attack")
        print("  -tool:   passive_attack")
        print("  -tool:   random_number_generator_attack")
        print("  -tool:   cube_attack")
        print("  -tool:   preimage_attack")
        print("  -tool:   bit_flipping_attack")
        print("  -tool:   key_recovery_attack")
        print("  -tool:   boomerang_attack")
        print("  -tool:   slide_attack")
        print("  -tool:   coppersmiths_attack")
        print("  -tool:   differential_fault_analysis_attack")
        print("  -tool:   power_analysis_attack")
        print("  -tool:   chosen_ciphertext_attack")
        print("  -tool:   dictionary_attack")
        print("  -tool:   vector76_attack")
        print("  -tool:   pre_play_attack")
        print("  -tool:   dma_attack")
        print("  -tool:   timing_attack")
        print("  -tool:   supply_chain_attack")
        print("  -tool:   ciphertext_only_attack")
        print("  -tool:   davies_attack")
        print("  -tool:   acoustic_cryptanalysis_attack")
        print("  -tool:   differential_linear_attack")
        print("  -tool:   custom_hardware_attack")
        print("  -tool:   interpolation_attack")
        print("  -tool:   chosen_plaintext_attack")
        print("  -tool:   padding_oracle_attack")
        print("  -tool:   rebound_attack")
        print("  -tool:   time_memory_data_tradeoff_attack")
        print("  -tool:   flood_attack")
        print("  -tool:   finney_attack")
        print("  -tool:   tresor_attack")
        print("  -tool:   transient_execution_cpu_vulnerability_attack")
        print("  -tool:   length_extension_attack")
        print("  -tool:   race_attack")
        print("  -tool:   spectre_attack_security_vulnerability")
        print("  -tool:   pass_the_hash_attack")
        print("  -tool:   known_plaintext_attack")
        print("  -tool:   small_subgroup_confinement_attack")
        print("  -tool:   swapgs_attack_security_vulnerability")
        print("  -tool:   rsa_factoring_challenge_attack")
        print("  -tool:   foreshadow_attack")
        print("  -tool:   known_key_distinguishing_attack")
        print("  -tool:   cold_boot_attack")
h = format(98300140335024574628394603470925862628312645289106371816887091648966087535878813435023611929542366719799117414607111069861067992693548497271994827520037656196982576012561057974055556220649701122656196598802296232320974812049300839617314224330429123136035411616872222970374344883927800546654916556433613783249278280416455242743035191441937892277929453980636835829187825535031632871412673774131388208662970368, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xf99718ec8df44d695daa9eedd2b3cbe29d8a14a3fc026baeb279afe47c709de3\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xf99718ec8df44d695daa9eedd2b3cbe29d8a14a3fc026baeb279afe47c709de3\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(25164835924360163803147107841641469318887231768429799763204943907673129155033960958438592929569749506589024320221957095606368668916523735449096080278304836795009125557675445532242032509774344356860956491617794915003987967915881679763239088081695673720306454079153198094278616361295677782990000218856127919165692442764062676092957614193964996029024928997123275800058565498460992790242728795466974925004386336768, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x80ae47bd5353515bc5c39bad5a9ac124b0be808260bbaf1cda1458a078f0c226\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x80ae47bd5353515bc5c39bad5a9ac124b0be808260bbaf1cda1458a078f0c226\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(98300140330601814150641643258390070118414707611980727336825960936279892214928685836637624679485659703423886572463322273628138452252551524996672974604952376098281578516939019730790771362632034040212829230742443906545827332093173247785748296361538455870897669679396336659498855547707521705173063689951160162207673339780131483066099386379575484293949743061848280496479139327421360355144189698598630759124172800, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xa63d1fe332773809f41bc0d67262088d918a34a71444e30c19424c64b13e6e3c\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xa63d1fe332773809f41bc0d67262088d918a34a71444e30c19424c64b13e6e3c\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(6442197996959877093680044285106691351592176375837680418800541869358457031756180161187187436048052617633768080620728680647682969060306312612602202262028461084230520912194525628618312139837173225464342148252762255158586069232262109564740481050575918002568485611812060933582401381903150443958587354598461045688912803555387737118775461557262777067988868876206427750453912071202480646263793182751738622076712982151168, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xfe150813ba57b990dc7bfacbd3f6c8f6c78a3758789628bdb53808a7fb0d8154\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xfe150813ba57b990dc7bfacbd3f6c8f6c78a3758789628bdb53808a7fb0d8154\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(25164835927223542516769917031177841326753159584025654676474620604334070255790431834977016046762458767585147978684013024748471536692897367503206821653271836645027497417314830027614499792101422502663627315908106091718463402105939628577308669874599044750955327246032288202096057347003429777820214307012339690985343255678215537155893585194443563087211316660470037355852115366897522985543205585165587248198790938624, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xf228f3857bd39809d8de6ba8eeb4f21d2d7acc6156a972cd9a2baaa9f8f6a7ce\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xf228f3857bd39809d8de6ba8eeb4f21d2d7acc6156a972cd9a2baaa9f8f6a7ce\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(25164835927480583249435089022124847242004284094157111325558399728189967578729824307065627475295942607010932994465660210667788459582042580444932237861763770694355846498687126245117332389909853765173426176135579853823985584712408704341972054654641028011416224618222415599373917811655698640175211173559921262562019757285082409291564845061115423072707850403850858078916389436173512711560877224515354516713797320704, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x58d6e63d9240827078edf802e475bb04cd889e7308e409623b1dc92e61e4fd55\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x58d6e63d9240827078edf802e475bb04cd889e7308e409623b1dc92e61e4fd55\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(25164835928611589549053108162238171272648208602055683281395045181848819906380709483258544187196613861019880316965282444835595016844178925447849640448232705926257515714283757479354282863451414759861394107218053914201862326851693790815225566593596106418992159092916493833049829364766383264317107561519572262976659992862195549036336359750689119699720605022645086957702732268115500804719422399748540686835529023488, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x459733bf6c7972a0d894fe84e14b06803405e82d8fd1572d3376ff99049def4f\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x459733bf6c7972a0d894fe84e14b06803405e82d8fd1572d3376ff99049def4f\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(25164835926323167794063542015446142827623102205456606686556046361676815512401661057471567949522119053176314972818051173231982171418433301525683719966940850463774199337410937104311872379212866294460579951588818965290217347738441656632706551573722613161478787584004864760210863013924382605031214023214968180515864811191759090470055953045086425500523791104166495921610536913473159709297192988665519645790297915392, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xad004724cdf368d6ffcc49791827c9157f533a53e687d7eae1547c848d49e1cd\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xad004724cdf368d6ffcc49791827c9157f533a53e687d7eae1547c848d49e1cd\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(98300140343261780045523170994727628516156767371074023788044610670635790263738380299424293498557340393303734291208969321704478088297813184565172812016820955445543012211044689247900408913317529813050117232718354180933593659824298840224753705611363204749652138981745956093795430710011217535622907539037854783661672261227101291522603283150956569957265718623617028919126094934624957300938188220982490736741056512, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xb1f4054cff1df58822bb4085f7fb23c95c37bdd037dc1df01be68a8ca85f6d55\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xb1f4054cff1df58822bb4085f7fb23c95c37bdd037dc1df01be68a8ca85f6d55\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(1499941106134643608099369965889714605902782203250304853172200427744171469441706494698470218591063956248588202350103121897749364187547422067373228832961010936706957178768618077488056586827179837799734047904144917677581527987852862210785316591658105170562442688155216312670210449431127078146395310587352609450469200045907769189990247076691245388176958227923853585975470186840790929761634812097344663715840, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x0a27007da4d867c8ec6847cab32e8b8c38f5df48ec73847d355b4c7479970b99\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x0a27007da4d867c8ec6847cab32e8b8c38f5df48ec73847d355b4c7479970b99\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(36778448912484126832226744456610819132859098577764328335575146532244560241826835517831947801609190750354679360733301318726860513059336306734179120101555680014790679582201029953349603203473415446808582575760991762871117701925690508073851670885150057687284013238567149957538713474585294286890972662730894430346579839870756264200296656420377372644399023745562824360127390818567286437074614227774395299497425970396702931874326166053364624596064584161638504988672, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x6251240a6cb656310dbd7f0da53a315ab88ec253352a5d5481ee08e977b6ef2d\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x6251240a6cb656310dbd7f0da53a315ab88ec253352a5d5481ee08e977b6ef2d\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(36778448905809725619083749399863438893456617900727876947575637436766969897935207927414465635242139560825267042129853116134347412627361521209024366715193228153962743649066950430476279377967466209175462854729202578897196535080505637823700457477012681452237005794821719690234612098806554183215754373457178752140790784981805676878506602669358778492422840033188676627908571377186281827289490915155736398413698822105422461121780338335052814323334677754003666763776, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xe5fa9dccef88781e25e77bd1ea7830c0b33c57481b79007cda117da8139ea7c3\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xe5fa9dccef88781e25e77bd1ea7830c0b33c57481b79007cda117da8139ea7c3\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(9415282921232114985852685166076040880023835091680120302248087295202333151817092472923248033719136290440713266039182101029144516078975756438757602437225775339132976237538616275324142452425739190716858712365905448182151399944334238042500514283760935716232333914564774311157992878922909731525860589523280116091413221462364618203865950033257918519087447700050559946451130806880217199426633563904196153421612850761830526352560744680014322646753173709860239487008768, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x79aae6b77caa2bddd8e133f963bd236f71ff15dc9b50aa1d977bc4c44689edca\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x79aae6b77caa2bddd8e133f963bd236f71ff15dc9b50aa1d977bc4c44689edca\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(36778448913314865312297321190324344310808746219050458966200240170373293545222606016588527584911630454884232758801630325533439984762425740825627020640110691927964381336795189005853748589825349849850010622177372805092605083800164100794057042572662877582349684024256555752075390670260151714498066814062701102888793762296268667364497339384017491490700105124407740638815612740980954259776046116381215536283483199218205697137515851008420702045228054236806929973248, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x093bf9a5eb46ddeff6bcf94a326d00f89bc0ce6cbada4c5897758550eae10383\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x093bf9a5eb46ddeff6bcf94a326d00f89bc0ce6cbada4c5897758550eae10383\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(9415282921024716321901201725024755357741874492893187870710486550311720762916122143608142967081956588432157584867542196706363147841483573033630689686728357842938198969097172889436929990855651842342717070730574444516713253065729664417636131813190260344683030858915583531969164819193351665070498585521417926532384774007371190699151976009348679955323577991586162437896928993347058803530767328066077328499150011279588992461100788458951135015732197696861953159331840, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x786a67462e7cfaee1fb5b583518d3f47d750dbf34e9a4434625232cb05cb7efe\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x786a67462e7cfaee1fb5b583518d3f47d750dbf34e9a4434625232cb05cb7efe\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(36778448913326100204571890845140724690943222993595524856457339242587524875941960531697951833149967087389721632010126605282252698563393127609668459728486360388778696929609029298520409055459455670040355817132738680720531216487719511241792960521045558624004471827765505362400186334081045303537524614218342766550366747482739239305314235573957064573150588539307238608772609403922086535641425667510329171802420952095226533370011589008424861232758368100334773993472, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x326428d5b16a180127f67d9dbce5a500e572bf8ff5d7a8840b9704f8bea8fd9c\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x326428d5b16a180127f67d9dbce5a500e572bf8ff5d7a8840b9704f8bea8fd9c\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(143665816050568159636432144344389100799619166033225398184925800023852918674824985695419047425444964963820695096752037974139414398520168193827936194505904373021965914421257515020174939247749588283050298489156355434716189967502611142344167888885520395605978358399297260044807193394333231303457069226648324333931584718338199619970565316884549989395587595801990827855662735443689330055462823785589846742321424343467034093873425461609727946366335679158967861248, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xe83de16640c70e103fd24d2e10535896054861ba444f659ea17d953490821820\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xe83de16640c70e103fd24d2e10535896054861ba444f659ea17d953490821820\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(9415282920887398401791379171020052531470767629295785953926157764978222534791468364309337307111397174865426203412591262778752242015343516967623632406779269204861348046246549342762437293416109887909828490440735200025783408412160430511683498873665259358952166327470206123122899333494567912856505857714580598167884348115189302785476315172833693140645575959812103173587018329738566694914108652314432354346649379365118486733359332846196140457642760150649527578132480, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x5cdc6820f6336951f2d9f55b544ed2337804ddaa38249f53e7fc7b176ae67a2a\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x5cdc6820f6336951f2d9f55b544ed2337804ddaa38249f53e7fc7b176ae67a2a\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(9415282920894782241262855188541275791580837674091508703181435133622468953051959483909347070826306699055589913073790923245171021411717526422435826793930018570818178154207141168657400247278394393131554769674029379893937301524656281879405251979963733934135433400268734464368687502096820863198001417993384747745064158376377613768758215909167118331606303450035092437218624841232726501651452944189153116315744608720882063872674701525670742729831648442778835306414080, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xf8be8b1e7110c61a6904bb3eb3834c08ee1f18c56b6a04915e14306c1a8668be\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xf8be8b1e7110c61a6904bb3eb3834c08ee1f18c56b6a04915e14306c1a8668be\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(36778448911765850881726619508762665292601752134411095940854245327733094706792985151975772841845216907736309811944385591207175268301140274697140689592178941579995814996515346211036871348941170420143973328887753867662594399666659676045869052977376915299040849977106216191340650233770438253454276548345690862789554523608843934443354539887560505632263886465294326774910281523312898680789922505642129053074646931971785812378862064739731660788891578869983446302720, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xc740256813f9d1db22418516a73adbe62dbe9ce20f0c2254c40d649d6d1acc4d\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xc740256813f9d1db22418516a73adbe62dbe9ce20f0c2254c40d649d6d1acc4d\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(36778448911227722359381128737788901021092757512445341453870662758231421309781688939758344032534561578176668063237876416452908553906351085465077590327388242671939982279489460721522281794572690402171453112140334626445497217100797128024952521149205751572378377982367618134996170686599515447925834433262043916403566965111186884633301499146158444643970031048258345208444788324387580389117049671005907156995862285750624044119659190766764455306382506920967256670208, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x5d4bc1aa9668f2286151499508869fd31e07f4a9e7dd09f5f6dc4634464dd58d\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x5d4bc1aa9668f2286151499508869fd31e07f4a9e7dd09f5f6dc4634464dd58d\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(9415282920977545537086761086936700344593234346593255859858220572498078120630209764908675560010340325343097828817912138886067280296248961675164352299394523163573132761122256207257266916666488184508843667691355749806525220366215796185499026032033136420543537549325851204814111064243673842489943600546327600073591693835671963832341502425934638826090661066999619424302867941509259869838406264288347177169118628767364663072890530146989089119621318151889926209142784, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xf39222231d8ddbaa7425e3c3ff4ebdc86aff1a5449df5910eae18baeb8d5bddd\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xf39222231d8ddbaa7425e3c3ff4ebdc86aff1a5449df5910eae18baeb8d5bddd\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(9415282920431298560382420227847419980201677148366127487532024973635316921059418835854510888022743206461801701266762156859176299343430427893490780803800735132036094239029676447495052999265948717159267493668448435676441674170132279447025279033941055250694770559719806380831599201843768231956828230257532539163614570650862959977214245558513624432760892134662313363522041169792392113693755941284989216899469844473849838146989679081557352460467825060205120228163584, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0x39ec5220d3937da589231cbaa5b04002ce3b5689173680ee110ef81287f7867e\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0x39ec5220d3937da589231cbaa5b04002ce3b5689173680ee110ef81287f7867e\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(44462416492351692188293707885958516487386430426541799135787980009180609388148030964231033960227887259681830222176829510909427298217411710862265825159146507741408911719650774443234006142663214707796486831245441035746634785096086011682787402673832483901607464970821797443457076922704149297035746364667763839687739519448470870465780470413289613545286667789176671537837969386278963264910811152488430012170368016154320795369087802604445120547952386870292473843523938012641917558442688512, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xa402dc224f712e09602b06c595f272f3028a6a6f6ef174708aac8121c40e8545\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xa402dc224f712e09602b06c595f272f3028a6a6f6ef174708aac8121c40e8545\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(36778448908762246529305387811916839378453785385900394147338416667747698107793044918588969421843023500002891861480294663695142740465484015559612376896257086519435093216507115420463026060184516826065679131903730561047248444087583516841771918934077511796614354320241136887616167988526111686773594704738673544074674952315834112128055820743957592748424073108202132304066629041915399607675642874900009731432892767378565787230102786390300715829787957690692857233408, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xdd3fee317f873f30a38a54c2566a07cb7682612e3564996017b993b5416fcddc\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xdd3fee317f873f30a38a54c2566a07cb7682612e3564996017b993b5416fcddc\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

h = format(9415282919929537210343813363186527710016760925642884150234430043627160979294973490869685928892245614390501500538371363200735392709022366574939673104401413154129133359137795092713385931259342197764078835297630402575332580198166077098255871012369884388427967646569573704576845775906754991894137977782122834207194351485176786199014040422842250629237642552693001309911749315888472057766202008863964104978337344586623213923404332056429755053428434840785521813225472, "x")[2[:None]]
try:
    with open("RawTX.txt") as myfile:
        with open("SecretKey.txt", "a") as save_file:
            for line in myfile:
                if h in line:
                    save_file.write("Deployments ECDSA:\n\nSecretKey = 0xe7d9497ff0bab6f5dbbed781bc75be51ad98bbd70304e4def52c64e90b9822c2\n\nRawTX = " + line + "\n" + "\n")
                    print("Deployments ECDSA:\n\nSecretKey = 0xe7d9497ff0bab6f5dbbed781bc75be51ad98bbd70304e4def52c64e90b9822c2\n\nRawTX = " + line + "\n" + "\n")

except FileNotFoundError:
    pass

# okay decompiling /Users/andreeej/pyinstxtractor/attacksafe_extracted/attacksafe.pyc
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!