Offline: Turn off the Internet. Use this page offline for more safety.
Waiting for input...
Instructions: 1. Enter a TXID. 2. If two consecutive inputs share the same R-Value (R-reuse), the Private Key will be recovered. 3. Internet connection is required for API access.
Note: Public Key is only available for P2PKH addresses that have been spent from (API lookup required).
Instructions: Enter a WIF key where the missing characters are replaced by an asterisk (*). Example: 5J*d*2V
Instructions: Enter a P2PKH (1...) or P2SH (3...) address and the number of transactions to analyze. This tool checks for repeated ECDSA R-values (nonce reuse) in the latest transactions, which indicates a severe vulnerability.
Instructions: 1. Enter two different TXIDs belonging to the same address. 2. The tool will extract R, S, Z, Public Key from both transactions inputs. 3. If it detects the same R-Value across any input between the two TXIDs, it will calculate the Private Key using the ECDSA formula.
Instructions: Choose your wallet type, select word count, and enter your recovery phrase. This tool runs completely offline using CryptoJS and SECP256k1 to derive your private key securely!
Instructions: Enter an address. The tool will securely fetch its transaction history from blockstream and run a deep structural mathematical analysis on its spending inputs to detect 'OP_CHECKMULTISIG' and deduce the Multi-Sig rules (e.g. 2-of-3) or Single-Sig logic. Internet connection required.
Instructions: Select a wallet.dat file using the 'Choose File' button, then click Process. The tool will parse the Berkeley DB, extract the Master Key Hash (JTR format), and list all encrypted private keys mapping to their Bitcoin addresses.
Instructions: Select a wallet.dat file using the 'Choose File' button, then click Process. The algorithm will deeply analyze the Berkeley DB B-Tree leaf pages, extracting hidden metadata, KDF iteration thresholds, and architectural anomalies to determine if the encryption has weaknesses or if a bypass is theoretically possible.
Instructions: This is an advanced cryptographic exploit tool. If two different addresses (with different private keys) sign transactions using the exact same random nonce 'k' (e.g., due to a broken random number generator), this tool mathematically exploits the failure to instantly calculate BOTH private keys. 1. Enter two suspicious TXIDs. 2. The tool will check for ECDSA signature nonce collision across different addresses. 3. If an identical R-value is detected, the modular inverse algebraic exploit will trigger.
Hardware Wallet Glitch / Memory Fault Private Key Reverse Engineering
Instructions: If a hardware wallet experiences a voltage drop/CPU glitch while signing, it might output a mathematically corrupted signature alongside a valid one for the same message hash. By comparing the 'S' value of the valid signature against the faulted 'S' value, this tool uses differential fault analysis ECDSA formulas to instantaneously deduce the internal secret Private Key.
Mutate ECDSA Signatures to covertly change the TXID of a transaction
Instructions: This exploit takes advantage of the ECDSA mathematical rule where (N - S) produces a completely valid complementary signature. 1. Enter a valid raw transaction hex. 2. The tool will parse the scriptSig, isolate the 'S' value, subtract it from the curve order N, and reconstruct the transaction. 3. The resulting transaction remains 100% valid and will transfer funds, but its main TXID will be entirely different (which historically broke Mt.Gox's tracking systems).
Combine mathematical fragments to restore a Master Secret (Lagrange Interpolation)
Instructions: Advanced security models split a private key into 'N' fragments (e.g. 5 fragments), requiring at least 'M' fragments (threshold, e.g. 3) to rebuild it. Paste your fragments (Shares) X,Y coordinates in Hexformat on separate lines as 'X:Y', specify the required threshold, and the tool will use Galois Field Arithmetic to mathematically re-assemble the original Private Key.
Extract hidden ASCII/Hex metadata embedded inside transaction outputs
Instructions: Hackers and data hoarders often use the OP_RETURN opcode (0x6a) to permanently write text, website hashes, or secret messages directly into the Bitcoin blockchain. Paste a raw transaction hex, and this tool will specifically scrape all outputs looking for 0x6a opcodes, extracting and decoding the concealed payload into readable format.
Reverse Engineer the entire HD Wallet Master Key using a single leaked Child Key
Instructions: If a user exposes their 'xpub' (Master Public Key) and an attacker manages to obtain even ONE single non-hardened child private key derived from it, the attacker can use the mathematical properties of HMAC-SHA512 to instantly calculate the Master Private Key (xprv), completely compromising the entire wallet. 1. Enter the Master 'xpub' string. 2. Enter the leaked child Private Key (in Hex or WIF). 3. Enter the exact derivation path of that child key.
Breakdown and extract Public Keys hidden inside a P2SH Multi-Sig script
Instructions: A P2SH Multi-Signature address hides its participants. However, when the coins are spent, the 'Redeem Script' is revealed on the blockchain. 1. Paste the Raw Hex of the Redeem Script. 2. The tool will parse the script mathematically, determine the 'M-of-N' rules, and extract every single participant's Public Key. 3. You can then use these Public Keys to trace individual identities or further target them.
Check balances for multiple Bitcoin addresses at once (P2PKH, P2SH, Bech32)
Instructions: Enter multiple Bitcoin addresses, one per line. Supports up to 5000 addresses.
Detect bit-leakage in transactions and mathematically build Python/SageMath Lattice reduction exact equations.
Instructions: If an address hasn't reused 'R', but its random nonces 'k' have a slight bias (e.g., first 128 bits are zero or leaked), this is vulnerable to a Lattice Attack. 1. Enter Address and set scanning limits. 2. The tool fetches (R, S, Z) for the latest transactions. 3. It performs a deep check to see if any mathematical bits are leaking.
Build a network-bypassing child transaction to force unstick a pending transaction (Child-Pays-For-Parent) or replace by fee.
Instructions: Is your transaction stuck with low fees? 1. Paste the raw Hex of the stuck transaction. 2. Enter the Private key of the receiving end. 3. Set an aggressive high fee rate. This math engine will isolate the stuck output, draft a brand new "Child" transaction, re-calculate the SIGHASH_ALL hashes, sign it using ECDSA, and give you a Raw Transaction Hex ready to be broadcasted to trick miners into confirming BOTH transactions instantly!
Generate modern P2TR (bc1p) addresses and mathematically engineer Schnorr aggregated signatures.
Instructions: Taproot uses Schnorr signatures for better privacy and lower fees. 1. Enter your Private Key. 2. The tool calculates the X-only Public Key and applies the required TapTweak. 3. It generates the final Mainnet 'bc1p' address using Bech32m encoding.
Clean up many small balances (dust) into a single address while minimizing network fees.
Instructions: 1. List all Private Keys holding small amounts of BTC. 2. Provide a single target address where you want to pool the funds. 3. Set a low fee rate to save money. The tool will fetch UTXOs for ALL keys and build one optimized transaction.