demining
Ensuring financial security of data / secp256k1 elliptic curve cryptography against weak ECDSA signatures in BITCOIN cryptocurrency cryptodeeptech@gmail.com
@sagemath
Pinned Repositories
bitcoindigger
Search for private keys to receive Bitcoins using own algorithm "Bloom filter".
Blockchain-Attack-Vectors
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
BTC-Recover-Crypto-Guide
BTCRecover is an open source wallet password and seed recovery tool. BTC Recover Crypto Guide wallet password and seed recovery tools open source
CryptoDeepTools
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Dao-Exploit
Cryptanalysis of the DAO exploit & Multi-Stage Attack
Endomorphism-Secp256k1
Speed up secp256k1 with endomorphism
Kangaroo-by-JeanLucPons
Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range
Lattice-Attack
One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins
MrRobotQR
«MrRobotQR» is an open source script that automates the process from entering a search keyword to deriving the private key of a Bitcoin wallet.
TerminalGoogleColab
Terminal CryptoDeepTech for Google Colab
demining's Repositories
demining/CryptoDeepTools
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
demining/Dao-Exploit
Cryptanalysis of the DAO exploit & Multi-Stage Attack
demining/Blockchain-Attack-Vectors
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
demining/Twist-Attack
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
demining/Twist-Attack-2
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
demining/23SolidityVulnerableHoneypots
Phenomenon from Blockchain Cryptocurrency Solidity Vulnerable Honeypots
demining/Install-SageMath-in-Google-Colab
Install SageMath in Google Colab
demining/Padding-Oracle-Attack-on-Wallet.dat
Padding Oracle Attack on Wallet.dat password decryption for the popular wallet Bitcoin Core
demining/ChatGPT-Bitcoin
ChatGPT as artificial intelligence gives us great opportunities in the security and protection of the Bitcoin cryptocurrency from various attacks
demining/Polynonce-Attack
POLYNONCE ATTACK we use BITCOIN signatures as a Polynomial to an arbitrarily high power of 128 bits to get a Private Key
demining/Log4j-Vulnerability
Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.
demining/Bitcoin-Utilities
Exploring Underrated Power of Bitcoin Utilities: comprehensive guide Google Colab and next big thing in cryptocurrency
demining/Cold-and-Hot-Wallets
Cold Wallets and Hot Wallets how to find vulnerabilities and eliminate various attacks on the Blockchain
demining/Dust-Attack
DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC
demining/Improving-Overall-Security
Improving the overall security of the ecosystem from attacks on smart contracts
demining/Install-SageMath-on-Fedora
Install SageMath for cryptanalysis on Fedora 64bit(10GB) Cloud Virtual Server
demining/Crypto-Wallet-Protection
How to protect your money in Bitcoin and Ethereum cryptocurrencies in the face of the rapid growth of fake crypto wallets
demining/ShellShock-Attack
ShellShock Attack vulnerability on “Bitcoin” & “Ethereum” server discovered in GNU Bash cryptocurrency exchange
demining/Solidity-Forcibly-Send-Ether-Vulnerability
Solidity Forcibly Send Ether Vulnerability to a Smart Contract continuation of the list of general EcoSystem security from attacks
demining/Gauss-Jacobi-Method-and-Machine-Learning-Process-BitcoinChatGPT
Decrypting Passwords to Access Lost Bitcoin Wallets Using Gauss-Jacobi Method and Machine Learning Process BitcoinChatGPT
demining/lattice-attack-249bits
LATTICE ATTACK 249bits we solve the problem of hidden numbers using 79 signatures ECDSA
demining/Milk-Sad-vulnerability-in-the-Libbitcoin-Explorer-3.x
Milk Sad vulnerability in the Libbitcoin Explorer 3.x library, how the theft of $900,000 from Bitcoin Wallet (BTC) users was carried out
demining/Attack-51
Attack 51%: Cryptocurrency Vulnerability Revealed
demining/Bitcoin-Lightning-Wallet-Vulnerability
How to find a private key in binary code from Bitcoin Lightning Wallet Vulnerability in Quasar Framework
demining/Blockchain-API-and-WEB-Services
Blockchain integration: API and web services capabilities for secure Bitcoin transactions
demining/Fuzzing-Bitcoin
Search for critical vulnerabilities and new methods of protecting cryptocurrency Bitcoin & Ethereum
demining/Chinese-version-of-Bitcoin-blockchain-cryptanalysis
比特币密码分析工具
demining/Deserialize-Signature-Vulnerability-in-Bitcoin-Network
In this study, we will look at the DeserializeSignature vulnerability, discovered in 2023, which allows attackers to create invalid signatures that can be accepted as valid by the Bitcoin network.
demining/Japanese-version-of-Bitcoin-blockchain-cryptanalysis
ビットコイン暗号解析ツール
demining/Korean-version-of-Bitcoin-blockchain-cryptanalysis
비트코인 암호화 분석 도구