Red Crypto Magic (Ethereum And Polkadot Private Key Crack and Hack From Mnemonic) Python Script :

Using and applying the fastest updated and new packages (bip_utils) with the latest encoding and decoding methods .

ethredcrypto
Ethereum Private Key Crack Hack Hunt Mnemonic

Polkadot (DOT) is a currency that uses the most sophisticated security methods in the creation of private keys, but now, by using a series of packages and methods, I will generate a private key and address for you in this script, after generating the private key, I will create a mnemonic. We hardcode your wallet address and then we search for that address in the list we define in it (the list of valuable wallets) at a very high speed.

Red Crypto Magic Private Key Crack and Hack From Mnemonic
Red Crypto Magic Private Key Crack and Hack From Mnemonic

The same method and tasks are also done for Ethereum, and there is no need for a special explanation.

Now you can also see other scripts about ethereum private key crack by referring to this [LINK] [Ethereum Private Key Hack and Crack Hunting With Mnemonic]


Ethereum Private Key Crack And Hack From Mnemonic SCRIPT (Source):

File : EthRedCryptoMAGIC.py 

# For Running Example : python EthRedCryptoMAGIC.py -f eth5.txt -v 10000 -n 32

import ctypes
import time
import optparse
import multiprocessing
from bip_utils import Bip32Slip10Secp256k1, Bip39MnemonicGenerator, Bip39SeedGenerator, Bip39WordsNum, EthAddrEncoder
from rich import print


def Main():
    p = optparse.OptionParser()
    p.add_option('-f', '--file', dest="filenameEth",
                 help="Ethereum Rich Address File With Type Format .TXT [Example: -f eth5.txt] ")
    p.add_option('-v', '--view', dest="ViewPrint", help="Print After Generated This Number Print And Report")
    p.add_option('-n','--thread', dest="ThreadCount", help="Total Thread Number (Total Core CPU)")
    (options, args) = p.parse_args()
    filename = options.filenameEth
    logpx = options.ViewPrint
    thco = options.ThreadCount
    # ----------------------- START ------------------------------ #
    with open(filename) as f:
        add = f.read().split()
    add = set(add)
    z = 0
    fu = 0
    logp = 0

    while True:
        z += 1
        ctypes.windll.kernel32.SetConsoleTitleW(f"MATCH:{fu} SCAN:{z}")
        mnemonic = Bip39MnemonicGenerator().FromWordsNumber(Bip39WordsNum.WORDS_NUM_24)
        seed_bytes = Bip39SeedGenerator(mnemonic).Generate()
        bip32_mst_ctx = Bip32Slip10Secp256k1.FromSeed(seed_bytes)
        MasterKey = bip32_mst_ctx.PrivateKey().Raw().ToHex()
        bip32_der_ctx = bip32_mst_ctx.DerivePath("m/44'/60'/0'/0/0")
        PrivateKeyBytes = bip32_der_ctx.PrivateKey().Raw().ToHex()
        addr = EthAddrEncoder.EncodeKey(bip32_der_ctx.PublicKey().KeyObject())
        Words24 = str(mnemonic)
        if addr in add:
            fu += 1
            print(f"[green1][+] MATCH ADDRESS FOUND IN LIST IMPORTED :[/green1] [white]{addr}[/white]")
            print(
                f"PrivateKey (Byte) : [green1]{PrivateKeyBytes}[/green1]\n[gold1]{mnemonic}[/gold1]\n[red1]MasterKey (Byte) : [/red1][green1]{MasterKey}[/green1]")
            with open('FoundMATCHAddr.txt', 'a') as f:
                f.write(
                    f"{addr}\n{PrivateKeyBytes}\n{mnemonic}\n{MasterKey}\n------------------------- MMDRZA.Com -------------------\n")
                f.close()
        elif int(z) % int(logpx) == 0:
            logp += int(logpx)
            print(
                f"[red][[green1]+[/green1]][GENERATED[white] {logp}[/white] ETH ADDR][WITH [white]128 THREAD[/white]][sK/Th:[white]{time.thread_time()}[/white]][/red]\n[red][[green1]{PrivateKeyBytes.upper()}[/green1]][/red]")
            print(
                f"[red][MasterKey : [white]{MasterKey.upper()}[/white]][/red]\n[white on red3][MNEMONIC : {Words24[0:64]}...][/white on red3]")
        else:
            print(
                f"[red][-][ GENERATED [cyan]{z}[/cyan] ETH ADDR ][FOUND:[white]{fu}[/white]][THREAD:[cyan]{thco}[/cyan]][/red]",
                end="\r")


jobs = []
if __name__ == '__main__':
    m = multiprocessing.Process(target=Main)
    jobs.append(m)
    m.start()
EthRedCryptoMAGIC.py (Source)

dotredcrypto
Polkadot RED CRYPTO MAGIC Private Key Crack From mnemonic

Polkadot Private Key Crack And Hack From Mnemonic SCRIPT (Source):

File : DotRedCryptoMAGIC.py 

# For Running Example : python DotRedCryptoMAGIC.py -f dot1000.txt -v 1000 -n 32

import ctypes
import time
import optparse
import multiprocessing
from bip_utils import Bip39MnemonicGenerator, Bip39WordsNum, Substrate, SubstrateBip39SeedGenerator, SubstrateCoins
from rich import print


def Main():
    p = optparse.OptionParser()
    p.add_option('-f', '--file', dest="filenameDot",
                 help="Polkadot Rich Address File With Type Format .TXT [Example: -f dot1000.txt] ")
    p.add_option('-v', '--view', dest="ViewPrint", default='10000',
                 help="Print After Generated This Number Print And Report(Default: 10000)")
    p.add_option('-n', '--thread', dest="ThreadCount", default='8',
                 help="Total Thread Number (Total Core CPU)(Default: 8)")
    (options, args) = p.parse_args()
    filename = options.filenameDot
    logpx = options.ViewPrint
    thco = options.ThreadCount
    # ----------------------- START ------------------------------ #
    with open(filename) as f:
        add = f.read().split()
    add = set(add)
    z = 0
    fu = 0
    logp = 0

    while True:
        z += 1
        ctypes.windll.kernel32.SetConsoleTitleW(f"MATCH:{fu} SCAN:{z}")
        mnemonic = Bip39MnemonicGenerator().FromWordsNumber(Bip39WordsNum.WORDS_NUM_24)
        # --------------- Generate Seed from Mnemonic --------------- #
        seed_bytes = SubstrateBip39SeedGenerator(mnemonic).Generate()
        # --------------- Construct from Seed --------------- #
        substrate_ctx = Substrate.FromSeed(seed_bytes, SubstrateCoins.POLKADOT)
        MasterPrivateKey = substrate_ctx.PrivateKey().Raw().ToHex()
        MasterPublicKey = substrate_ctx.PublicKey().RawCompressed().ToHex()
        substrate_ctx = substrate_ctx.ChildKey("//hard")
        PrivateKeyExt = substrate_ctx.PrivateKey().Raw().ToHex()
        substrate_ctx = substrate_ctx.DerivePath("//0/1")
        PrivateKeyBytes = substrate_ctx.PrivateKey().Raw().ToHex()
        Pub2Addr = substrate_ctx.PublicKey().ToAddress()
        addr = substrate_ctx.PublicKey().ToAddress()
        addrEx = substrate_ctx.PublicKey().ToAddress()
        Words24 = str(mnemonic)
        if addr in add or addrEx in add or Pub2Addr in add:
            fu += 1
            print(f"[green1][+] MATCH ADDRESS FOUND IN LIST IMPORTED :[/green1] [white]{addr}[/white]")
            print(f"[red][[green1]{addrEx}[/green1]][/red]")
            print(f"[red][PUB: [white]{Pub2Addr}[/white]][/red]")
            print(
                f"PrivateKey (Byte) : [green1]{PrivateKeyBytes}[/green1]\n[gold1]{mnemonic}[/gold1]\n[red1]MasterKey (Byte) : [/red1][green1]{MasterPrivateKey}[/green1]\n[gold1]{MasterPublicKey}[/gold1]")
            with open('FoundMATCHAddr.txt', 'a') as f:
                f.write(
                    f"{addr}\n{addrEx}\n{Pub2Addr}\n{PrivateKeyBytes}\n{mnemonic}\n{MasterPrivateKey}\n{PrivateKeyExt}\n{MasterPublicKey}------------------------- MMDRZA.Com -------------------\n")
                f.close()
        elif int(z) % int(logpx) == 0:
            logp += int(logpx)
            print(
                f"[red][[green1]+[/green1]][GENERATED[white] {logp}[/white] DOT ADDR][WITH [white]{thco} THREAD[/white]][sK/Th:[white]{time.thread_time()}[/white]][/red]\n[red][[green1]{PrivateKeyBytes.upper()}[/green1]][/red]")
            print(
                f"[red][MasterKey : [white]{MasterPrivateKey.upper()}[/white]][/red]\n[white on red3][MNEMONIC : {Words24[0:64]}...][/white on red3]")
        else:
            print(
                f"[red][-][ GENERATED [cyan]{z}[/cyan] POLKADOT ADDRESS ][FOUND:[white]{fu}[/white]][THREAD:[cyan]{thco}[/cyan]][DATAIMPORTED:[white]{filename}[/white]][/red]",
                end="\r")


jobs = []
if __name__ == '__main__':
    m = multiprocessing.Process(target=Main)
    jobs.append(m)
    m.start()
DotRedCryptoMAGIC.py

packicon  INSTALL PAYTHON PACKAGE’S (Windows)

pip install bip_utils
pip install rich
pip install optparse

packicon  INSTALL PAYTHON PACKAGE’S (Linux)

pip3 install rich bip_utils optparse


-h OR –help        Show this help message and exit
-f OR –file           Ethereum Rich Address File With Type Format .TXT [Example: -f eth5.txt or –file eth5.txt]
-v OR –view        Print After Generated This Number Print And Report
-n OR –thread    Total Thread Number (Total Core CPU)


pyicon  Download Source File
opera extension icon EthRedCryptoMAGIC.py
extension icon DotRedCryptoMAGIC.py
text html icon eth5.txt
multipart encrypted icon dot1000.txt

By Crypto Attacker

Programmer Python , java react solidity and php, Crypto Attacker Crack and Brute Force attacking and hack crypto (BTC, ETH, TRX , LTC , Dogecoin & ...)

Leave a Reply