Skip to content

Latest commit

 

History

History
38 lines (32 loc) · 1.24 KB

README.md

File metadata and controls

38 lines (32 loc) · 1.24 KB

Only for Linux (ubuntu) The developers have removed the utility everywhere, it is impossible to compile from the source code.
It is very difficult to find a vulnerable version 3.2.
Miner got the explorer from the docker, now you can buy it $100 https://t.me/cuda8
32-bit vulnerability is 4294967295 mnemonic phrases.
9 languages, 12, 15, 18, 21, 24 words. 193,273,528,275 is tens of TB.
The vulnerability affected not only BTC, ETH, but also tokens, other coins.

Launch example.
./bx-linux-x64-qrcode_3_2 seed -b 256 | ./bx-linux-x64-qrcode_3_2 mnemonic-new

./bx-linux-x64-qrcode_3_2 seed -b 256 | ./bx-linux-x64-qrcode_3_2 mnemonic-new -l es

./bx-linux-x64-qrcode_3_2 seed -b 128 | ./bx-linux-x64-qrcode_3_2 mnemonic-new -l ja

Languages
--language
en (default)
-l es
-l fr
-l it
-l ja
-l cs
-l ru
-l uk
-l zh_Hans
-l zh_Hant

(Phrase length 12, 15, 18, 21, 24)
-b 128
-b 160
-b 192
-b 224
-b 256

A multi-cpu script is sent to the explorer that generates a stream of phrases into a text file.
It is also possible to generate vulnerable private keys from BTC, ETH and other coins.
./bx-linux-x64-qrcode_3_2 seed -b 256 >> Out.txt