Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added candy #283

Open
wants to merge 27 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
27 commits
Select commit Hold shift + click to select a range
c68e662
Read CHANGELOG.md to see the updates
albertobsd Apr 28, 2023
765f23d
Fixed README.md
albertobsd Apr 28, 2023
63aa8fb
some fixes, check CHANGELOG.md
albertobsd Apr 30, 2023
e5d093f
Update keyhunt.cpp
seega May 4, 2023
65987aa
Update Random.cpp
seega May 4, 2023
f08dff0
Merge pull request #208 from seega/main
albertobsd May 4, 2023
d3d9ef6
cygwin fix v2
seega May 6, 2023
ec56e1f
cygwin fix
seega May 6, 2023
0253114
Revert "cygwin fix"
seega May 6, 2023
6a25033
Update Random.cpp
seega May 6, 2023
1cce3bb
Merge pull request #210 from seega/main
albertobsd May 7, 2023
d29ea17
added option -6 to skip checksums, check CHANGELOG.md
albertobsd May 7, 2023
8d54417
Update keyhunt.cpp
seega May 7, 2023
dfb710b
Merge pull request #212 from seega/main
albertobsd May 7, 2023
8a51838
Added warning for BSGS and Endomorphism, they don't work together
albertobsd May 8, 2023
5a8d6c0
Update README.md
mysterek1337 May 12, 2023
84330e6
Merge pull request #213 from mysterek1337/main
albertobsd May 12, 2023
a278e8c
added keyhunt_legacy.cpp legacy version, check README.md
albertobsd May 16, 2023
98b20ef
removed unused flags in the Makefile
albertobsd May 16, 2023
dddd177
fixed some bugs for legacy version
albertobsd May 17, 2023
3cd3376
Small editions of unused variables
albertobsd May 17, 2023
f92555a
endomorphism for eth
albertobsd May 18, 2023
88934c8
endomorphism for eth in legacy version
albertobsd May 18, 2023
d345a3c
Speed x2 for BSGS mode main
albertobsd May 19, 2023
2b3c218
Double BSGS speed for legacy version
albertobsd May 20, 2023
e3c6762
BSGS Server (Only linux)
albertobsd May 30, 2023
a19a745
Solving some BSGS Server issues
albertobsd Jun 3, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Solving some BSGS Server issues
- Fix typo in point hex check
  • Loading branch information
albertobsd authored and rucko24 committed Dec 25, 2023
commit a19a745c2acc599d546eb32675b69ed20dd3df83
63 changes: 62 additions & 1 deletion BSGSD.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,8 @@ Same as keyhunt we need to do
- `-t number` Threads Number
- `-k factor` Same K factor dor keyhunt
- `-n number` Length of the Range to scan each cycle, same as keyhunt
- `-i ip` IP for listening default is `127.0.0.1`
- `-p port` Port for listening default is `8080`

bsgsd use the same keyhunt files `.blm` and `.tbl`

Expand Down Expand Up @@ -100,4 +102,63 @@ I know what are you thinking, but if you are doing 10 ranges of 63 bits, you can
But if i do the program multi-client, and you send the 10 ranges at the same time in 10 different connections, the whole process will also take 80 seconds... so is only question of how your client send the data and manage the ranges..

### Client
**There is public NO client**, i think that this is fair, I already write a lot of code for free, if this server fits your needs write your on client on python or any other langue that you like.

Here is a small python example to implent by your self as client.

```
import socket
import time

def send_and_receive_line(host, port, message):
# Create a TCP socket
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

try:
# Connect to the server
sock.connect((host, port))

# Send the message
start_time = time.time()
sock.sendall(message.encode())

# Receive the reply
reply = sock.recv(1024).decode()
end_time = time.time()

# Calculate the elapsed time
elapsed_time = end_time - start_time
sock.close()
return reply, elapsed_time

except ConnectionResetError:
print("Server closed the connection without replying.")
return None, None

except ConnectionRefusedError:
print("Connection refused. Make sure the server is running and the host/port are correct.")
return None, None

except AttributeError:
pass
return None, None


# TCP connection details
host = 'localhost' # Change this to the server's hostname or IP address
port = 8080 # Change this to the server's port number

# Message to send
message = '0365ec2994b8cc0a20d40dd69edfe55ca32a54bcbbaa6b0ddcff36049301a54579 4000000000000000:8000000000000000'

# Number of iterations in the loop
num_iterations = 5

# Loop for sending and receiving messages
for i in range(num_iterations):
reply, elapsed_time = send_and_receive_line(host, port, message)
if reply is not None:
print(f'Received reply: {reply}')
print(f'Elapsed time: {elapsed_time} seconds')
```

The previous client example only repeat 5 times the same target, change it according to your needs.
2 changes: 0 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,6 @@

Tool for hunt privatekeys for crypto currencies that use secp256k1 elliptic curve



Post: https://bitcointalk.org/index.php?topic=5322040.0

Work for Bitcoin
Expand Down
Loading