Bruteforce ECDSA [ RAT Spy Recovery Tool]
Do not ask questions about how to configure or use the software if you are a newbie, dont buy this.
I’m not responsible for improper use of the code contained in these repositories. This code is mostly proof of concept and it has been shared only for security research purpose to integrate a related article. No support will be provided.
LIMITATIONS
The program currently only works on unix-like POSIX systems (e.g. GNU/Linux). Different versions of BerkeleyDB are usually not compatible with each other. Therefore, for the program to work, you will have to check that the BerkeleyDB version you are using can read the databases created by the BerkeleyDB version your wallet was created with.
EXAMPLES
Try to find the password of an encrypted wallet file using 4 threads, trying only passwords with 5 characters: $ bruteforce-wallet -t 4 -l 5 -m 5 wallet.dat Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 5 to 10 characters beginning with "W4l" and ending with "z": $ bruteforce-wallet -t 8 -l 5 -m 10 -b "W4l" -e "z" wallet.dat Try to find the password of an encrypted wallet file using 8 threads, trying only passwords with 10 characters using the character set "P情8ŭ": $ bruteforce-wallet -t 8 -l 10 -m 10 -s "P情8ŭ" wallet.dat Try to find the password of an encrypted wallet file using 6 threads, trying the passwords contained in a dictionary file: $ bruteforce-wallet -t 6 -f dictionary.txt wallet.dat Print progress info: $ pkill -USR1 -f bruteforce-wallet Print progress info every 30 seconds: $ bruteforce-wallet -t 6 -f dictionary.txt -v 30 wallet.dat Save/restore state between sessions: $ bruteforce-wallet -t 6 -f dictionary.txt -w state.txt wallet.dat (Let the program run for a few minutes and stop it) $ bruteforce-wallet -t 6 -w state.txt wallet.dat
Reviews
There are no reviews yet