Repository: https://github.com/oritwoen/vuke License: MIT
Language: Rust
What is vuke?vuke is a security research tool for reproducing and analyzing historically vulnerable Bitcoin key generation methods. If you're into wallet vulnerability archaeology, verifying your own keys for weak generation patterns, or academic cryptographic research - this tool is for you.
Key Features🔄 Key Generation (forward)- Transforms: SHA256, double SHA256, MD5, Milksad, MT19937-64, LCG, Xorshift, SHA256 chains, Electrum, Armory, MultiBit HD, Bitimage
- Input sources: numeric ranges, wordlists, timestamps, stdin, binary files
- Parallel processing via Rayon - full CPU utilization
🔍 Key Analysis (reverse)- Brute-force 2^32 seeds (Milksad, LCG, SHA256 chain)
- Brute-force 2^64 with cascade filter (MT19937-64, Xorshift)
- Pattern detection (small seeds, ASCII strings)
- Heuristic analysis (entropy, hamming weight)
🎯 Target Scanning- Match generated keys against known address lists
- Provider integration (boha:b1000 puzzles)
- Cascade filter for false positive reduction
💾 Storage & Cloud- Parquet format for TB-scale analysis
- SQL queries via DuckDB
- S3/R2/MinIO upload
- Apache Iceberg catalog registration
⚡ Optional GPU (WebGPU)- SHA256 and MT19937 acceleration
- Feature-gated: --features gpu
Disclaimer⚠️ This tool is for educational and security research purposes only. Do not use it to access wallets you do not own. The authors are not responsible for any misuse.Links- 📦 GitHub:
https://github.com/oritwoen/vuke- 📖 Documentation:
https://deepwiki.com/oritwoen/vuke- 🦀 crates.io:
https://crates.io/crates/vukeFeedback, issues and PRs welcome! 🙏