Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/demining/twist-attack-2
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
https://github.com/demining/twist-attack-2
attack attacker bitcoin bitcoin-wallet blockchain blockchain-technology cryptocurrency exploit exploiting exploiting-vulnerabilities hack hacking vulnerabilities vulnerability vulnerability-scanners
Last synced: 4 days ago
JSON representation
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
- Host: GitHub
- URL: https://github.com/demining/twist-attack-2
- Owner: demining
- Created: 2023-03-02T11:02:23.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-09-09T14:15:22.000Z (about 1 year ago)
- Last Synced: 2023-09-09T15:26:30.066Z (about 1 year ago)
- Topics: attack, attacker, bitcoin, bitcoin-wallet, blockchain, blockchain-technology, cryptocurrency, exploit, exploiting, exploiting-vulnerabilities, hack, hacking, vulnerabilities, vulnerability, vulnerability-scanners
- Language: HTML
- Homepage: https://cryptodeeptech.ru/twist-attack-2
- Size: 4.29 MB
- Stars: 9
- Watchers: 3
- Forks: 0
- Open Issues: 1