demining
Ensuring financial security of data / secp256k1 elliptic curve cryptography against weak ECDSA signatures in BITCOIN cryptocurrency cryptodeeptech@gmail.com
@sagemath
Pinned Repositories
bitcoindigger
Search for private keys to receive Bitcoins using own algorithm "Bloom filter".
Blockchain-Attack-Vectors
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
Break-ECDSA-cryptography
The very first serious vulnerability in Blockchain and how to get the public key Bitcoin ECDSA RSZ value from the RawTX file
BTC-Recover-Crypto-Guide
BTCRecover is an open source wallet password and seed recovery tool. BTC Recover Crypto Guide wallet password and seed recovery tools open source
CryptoDeepTools
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Dao-Exploit
Cryptanalysis of the DAO exploit & Multi-Stage Attack
Kangaroo-by-JeanLucPons
Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range
Lattice-Attack
One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins
Padding-Oracle-Attack-on-Wallet.dat
Padding Oracle Attack on Wallet.dat password decryption for the popular wallet Bitcoin Core
TerminalGoogleColab
Terminal CryptoDeepTech for Google Colab
demining's Repositories
demining/CryptoDeepTools
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
demining/bitcoindigger
Search for private keys to receive Bitcoins using own algorithm "Bloom filter".
demining/TerminalGoogleColab
Terminal CryptoDeepTech for Google Colab
demining/Padding-Oracle-Attack-on-Wallet.dat
Padding Oracle Attack on Wallet.dat password decryption for the popular wallet Bitcoin Core
demining/Dao-Exploit
Cryptanalysis of the DAO exploit & Multi-Stage Attack
demining/Twist-Attack-2
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
demining/Dust-Attack
DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC
demining/Polynonce-Attack
POLYNONCE ATTACK we use BITCOIN signatures as a Polynomial to an arbitrarily high power of 128 bits to get a Private Key
demining/Discrete-Logarithm
Discrete Logarithm mathematical methods and tools for recovering cryptocurrency wallets Bitcoin
demining/Milk-Sad-vulnerability-in-the-Libbitcoin-Explorer-3.x
Milk Sad vulnerability in the Libbitcoin Explorer 3.x library, how the theft of $900,000 from Bitcoin Wallet (BTC) users was carried out
demining/Bitcoin-Lightning-Wallet-Vulnerability
How to find a private key in binary code from Bitcoin Lightning Wallet Vulnerability in Quasar Framework
demining/Bluetooth-Attacks-CVE-2025-27840
Bitcoin Cryptanalysis: CVE-2025-27840 Vulnerability in ESP32 Microcontrollers Puts Billions of IoT Devices at Risk via Wi-Fi & Bluetooth
demining/Tutorials-Power-AI
Tutorials Power AI list and categories of Artificial Intelligence for Business
demining/Vector76-Attack
Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data
demining/Biggest-Lost-Bitcoin-Wallets-List
Machine learning algorithms from repository Smart-Transformers retrieved lost cryptocurrency wallets from the Bitcoin network for a total amount of: 2127 BTC
demining/Bitcoin-Utilities
Exploring Underrated Power of Bitcoin Utilities: comprehensive guide Google Colab and next big thing in cryptocurrency
demining/Gauss-Jacobi-Method-and-Machine-Learning-Process-BitcoinChatGPT
Decrypting Passwords to Access Lost Bitcoin Wallets Using Gauss-Jacobi Method and Machine Learning Process BitcoinChatGPT
demining/lattice-attack-249bits
LATTICE ATTACK 249bits we solve the problem of hidden numbers using 79 signatures ECDSA
demining/ShellShock-Attack
ShellShock Attack vulnerability on “Bitcoin” & “Ethereum” server discovered in GNU Bash cryptocurrency exchange
demining/Blockchain-API-and-WEB-Services
Blockchain integration: API and web services capabilities for secure Bitcoin transactions
demining/Jacobian-Curve-Algorithm-Vulnerability
Jacobian Curve Coordinate Manipulation: Exploring the Vulnerability of a Fake Signature Using a Bitcoin Wallet Decodable File
demining/An-attempt-to-predict-the-behavior-of-the-properties-of-the-secp256k1-Elliptic-Curve
An attempt to predict the behavior of the properties of the secp256k1 Elliptic Curve: Cryptography and cryptocurrency related parameters secp256k1 reveals several vulnerabilities and potential threats:
demining/Chinese-version-of-Bitcoin-blockchain-cryptanalysis
比特币密码分析工具
demining/Signature-Malleability
Research into Signature Malleability and Private Key Compromise in Bitcoin Signatures
demining/Attack-51
Attack 51%: Cryptocurrency Vulnerability Revealed
demining/Deserialize-Signature-Vulnerability-in-Bitcoin-Network
In this study, we will look at the DeserializeSignature vulnerability, discovered in 2023, which allows attackers to create invalid signatures that can be accepted as valid by the Bitcoin network.
demining/Fuzzing-Bitcoin
Search for critical vulnerabilities and new methods of protecting cryptocurrency Bitcoin & Ethereum
demining/Quantum-Attacks-on-Bitcoin
Quantum Attacks on Bitcoin: Assessing Vulnerabilities and Developing Defense Strategies Against Emerging Quantum Computing Threats
demining/Japanese-version-of-Bitcoin-blockchain-cryptanalysis
ビットコイン暗号解析ツール
demining/Korean-version-of-Bitcoin-blockchain-cryptanalysis
비트코인 암호화 분석 도구