Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

I can't check it #147

Open
Bogomexp opened this issue Mar 10, 2021 · 7 comments
Open

I can't check it #147

Bogomexp opened this issue Mar 10, 2021 · 7 comments

Comments

@Bogomexp
Copy link

Hi, I wanted to test the program and added a passphrase "password".
16ga2uqnF1NqpAuQeeg7sTCAdtDUwDyJav(uncomressed) and 16qVRutZ7rZuPx7NMtapvZorWYjyaME2Ue(compressed) translated to .hex and made bloom filter.
But the brainflayer didn't find a match, what did I do wrong?

@IKramsaev
Copy link

hello

add hash160 to the.hex file and then it will find

@IKramsaev
Copy link

image

/

@Bogomexp
Copy link
Author

image

/

16ga2uqnF1NqpAuQeeg7sTCAdtDUwDyJav
It is 003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13 or 3e546d0acc0de5aa3d66d7a920900ecbc66c2031 ??
Give PLS valid converter

@Bogomexp
Copy link
Author

it worked! I used 003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13 instead of 3e546d0acc0de5aa3d66d7a920900ecbc66c2031
But I can't find a converter(base to hex) for the big .txt files.

@uzvervolf
Copy link

uzvervolf commented May 16, 2021

I have a same problem, HELP!!!
adress 1KcT6bGSGiWA2xDnuKJPhksQ3NqrDmsmfA
i tried hashes
00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825
cc269b6094fff835a20b96d688912edcb49daae4
I saved these hashes with a text editor to hexbtc.hex and then run
./hex2blf hexbtc.hex hexbtc.blf
Then I ran
./brainflayer -v -b hexbtc.blf -i words.txt -o found.txt.
The words.txt file has my 12 word combination (depart bridge doll keen kid winter bus option thank tank expect grief), but I got the result "" rate: 53833.62 p / s found: 0/3203 elapsed: 0.059 s ""
Could it be wrong hashes?
Maybe the problem is in the bloom filter?
Maybe my sequence of actions is wrong?
Could you check the wallet and phrase on your brainflayer?

P.S. i have perl convertors to hash for big .txt files (i check on 1.4G)
1-st convert to 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825
2-nd convert to cc269b6094fff835a20b96d688912edcb49daae4

I installed Ghex, saw after the hash point, remove it, again converted into .blf and again run brainflayer, but again - not found (((HELP PLEASE

Also, i used hashes
003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13
3e546d0acc0de5aa3d66d7a920900ecbc66c2031
and passphrase "password" in words.txt from this topic - and it doesn't work again

@Bogomexp
Copy link
Author

I have a same problem, HELP!!!
adress 1KcT6bGSGiWA2xDnuKJPhksQ3NqrDmsmfA
i tried hashes
00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825
cc269b6094fff835a20b96d688912edcb49daae4
I saved these hashes with a text editor to hexbtc.hex and then run
./hex2blf hexbtc.hex hexbtc.blf
Then I ran
./brainflayer -v -b hexbtc.blf -i words.txt -o found.txt.
The words.txt file has my 12 word combination (depart bridge doll keen kid winter bus option thank tank expect grief), but I got the result "" rate: 53833.62 p / s found: 0/3203 elapsed: 0.059 s ""
Could it be wrong hashes?
Maybe the problem is in the bloom filter?
Maybe my sequence of actions is wrong?
Could you check the wallet and phrase on your brainflayer?

P.S. i have perl convertors to hash for big .txt files (i check on 1.4G)
1-st convert to 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825
2-nd convert to cc269b6094fff835a20b96d688912edcb49daae4

I installed Ghex, saw after the hash point, remove it, again converted into .blf and again run brainflayer, but again - not found (((HELP PLEASE

Also, i used hashes
003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13
3e546d0acc0de5aa3d66d7a920900ecbc66c2031
and passphrase "password" in words.txt from this topic - and it doesn't work again

check in what format words.txt must be UTF-8 Unix(LF)!

@Bogomexp
Copy link
Author

"depart bridge doll keen kid winter bus option thank tank expect grief"
hex - 42ccb7ce0e7eb16608442ccc7b9ba4b94668831a

"password"
hex - 3e546d0acc0de5aa3d66d7a920900ecbc66c2031

I have a same problem, HELP!!!
adress 1KcT6bGSGiWA2xDnuKJPhksQ3NqrDmsmfA
i tried hashes
00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825
cc269b6094fff835a20b96d688912edcb49daae4
I saved these hashes with a text editor to hexbtc.hex and then run
./hex2blf hexbtc.hex hexbtc.blf
Then I ran
./brainflayer -v -b hexbtc.blf -i words.txt -o found.txt.
The words.txt file has my 12 word combination (depart bridge doll keen kid winter bus option thank tank expect grief), but I got the result "" rate: 53833.62 p / s found: 0/3203 elapsed: 0.059 s ""
Could it be wrong hashes?
Maybe the problem is in the bloom filter?
Maybe my sequence of actions is wrong?
Could you check the wallet and phrase on your brainflayer?

P.S. i have perl convertors to hash for big .txt files (i check on 1.4G)
1-st convert to 00CC269B6094FFF835A20B96D688912EDCB49DAAE423CD1825
2-nd convert to cc269b6094fff835a20b96d688912edcb49daae4

I installed Ghex, saw after the hash point, remove it, again converted into .blf and again run brainflayer, but again - not found (((HELP PLEASE

Also, i used hashes
003e546d0acc0de5aa3d66d7a920900ecbc66c20314648aa13
3e546d0acc0de5aa3d66d7a920900ecbc66c2031
and passphrase "password" in words.txt from this topic - and it doesn't work again

"depart bridge doll keen kid winter bus option thank tank expect grief"
hex - 42ccb7ce0e7eb16608442ccc7b9ba4b94668831a

"password"
hex - 3e546d0acc0de5aa3d66d7a920900ecbc66c2031

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants