32btc bounty address search on GPU
☆19Jan 2, 2024Updated 2 years ago
Alternatives and similar repositories for vanitygen
Users that are interested in vanitygen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Apr 3, 2021Updated 5 years ago
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- rnn/lstm to generate private keys from public keys of known high value☆39Jan 7, 2022Updated 4 years ago
- Empty npm package to «uninstall» unused transitive dependencies☆13Sep 9, 2023Updated 2 years ago
- Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED☆17Nov 27, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- online decision-making platform☆14Sep 10, 2023Updated 2 years ago
- BOP Bitcoin Client Libraries☆19Apr 23, 2015Updated 10 years ago
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- Script which directly generate 4-digit NACA profile to .STL file in ASCII code.☆14May 15, 2018Updated 7 years ago
- A powerful solution for tackling the Elliptic Curve Discrete Logarithm Problem (ECDLP) within the context of secp256k1.☆11Dec 13, 2025Updated 3 months ago
- python script to scan BTC blockchain for input scripts with reused r values☆27Mar 26, 2023Updated 3 years ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- Bitcoin & altcoins chainstate (old & new formats) parser☆93Nov 16, 2021Updated 4 years ago
- Bitcoin addresses bruteforce tool via GPU OpenCL☆62Jan 25, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Brute force Bitcoin private keys.☆99Apr 16, 2021Updated 4 years ago
- ECDSA nonce-reuse attack to recover a private key.☆50Mar 27, 2026Updated 2 weeks ago
- Kangaroo with the goal of improving efficiency without losing the success rate.☆16Dec 13, 2024Updated last year
- (Lua)TeX package to automatically remove widows and orphans from any document☆21Feb 19, 2026Updated last month
- sRGB gamma tranformations in C++ and Python☆16Apr 5, 2018Updated 8 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- A MITM "forwarding proxy" for the Stratum mining protocol. For debugging use ONLY.☆33Mar 17, 2018Updated 8 years ago
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bloom filter alternative (C++)☆18Nov 8, 2018Updated 7 years ago
- Pollard's kangaroo for SECPK1☆35Jun 22, 2024Updated last year
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- a .NET bitcoin's blockchain parser☆34Nov 21, 2014Updated 11 years ago
- A beginner's guide to computer programming (2006)☆12Aug 10, 2018Updated 7 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Feb 5, 2018Updated 8 years ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- Grammar prioritization support for EUSolver.☆14Jul 18, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- Basic Arithmetic or Advanced Cryptographic Protocols, SECP256k2 Provides the Essential Functions Needed for Modern Cryptography Generatin…☆10Jul 30, 2024Updated last year
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- Library for elliptic curve (ECDSA) private keys, public keys, and bitcoin addresses.☆14Mar 11, 2025Updated last year
- A book generator☆27Feb 21, 2026Updated last month
- Core smart contracts of Unipeer☆11Dec 11, 2023Updated 2 years ago