Giter Site home page Giter Site logo

gurnec / btcrecover Goto Github PK

View Code? Open in Web Editor NEW
1.2K 79.0 662.0 2.33 MB

An open source Bitcoin wallet password and seed recovery tool designed for the case where you already know most of your password/seed, but need assistance in trying different possible combinations.

License: GNU General Public License v2.0

Shell 0.12% Python 96.40% C 3.48%
bitcoin password-recovery

btcrecover's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

btcrecover's Issues

Error after install running tests

I have installed on Ubuntu 16.04, and tried to run the test script but get the following error:

bash: /home/r/Desktop/btcrecover-master/run-all-tests.py: /usr/bin/python^M: bad interpreter: No such file or directory

Can you assist please

run-all-tests.py Error

The error is at the start it says:

run-all-tests.py: warning: DLL load failed: The specified module could not be found
** Testing in ANSI character mode **
.s.........................................s.................................................................s...................................................... ...
run-all-tests.py: warning: DLL load failed: The specified module could not be found
run-all-tests.py: warning: DLL load failed: The specified module could not be found
....
etc.
Ran 276 tests in 92.44s
OK (skipped=47)

and the same with UNICODE

run-all-tests py

Converting btcrecover extract to JTR

For android/multibit key, there is a JTR option with this format =

$openssl$cipher$md$salt-size$salt$last-chunks$inlined$known-plaintext$plaintext

I was wondering how I would go about using the info the extract gives me to covert it for JTR use?

Question about use

So I was going to modify bitcoin-core to because my significant other locked themselves out of a wallet with 20 bitcoins in it. We wrote a script to try to do it directly but the RPC made it far too slow to check passwords.

Is this built in a way that the passwords are directly checked against the wallet without using any RPC. The wallet was a bitcoin-core wallet, can I use a GPU to speed up the process?

Error trying to decrypt first password for Blockchain.info wallet

Hello!

When running:

python btcrecover.py --wallet wallet.aes.json --tokenlist tokens

I'm getting
Traceback (most recent call last): File "btcrecover.py", line 35, in <module> btcrpass.parse_arguments(sys.argv[1:]) File "/home/user/btcrecover-master/btcrecover/btcrpass.py", line 3420, in parse_arguments parse_tokenlist(tokenlist_file, tokenlist_first_line_num) File "/home/user/btcrecover-master/btcrecover/btcrpass.py", line 3691, in parse_tokenlist if line.startswith("#"): UnicodeDecodeError: 'ascii' codec can't decode byte 0xc3 in position 21: ordinal not in range(128)

Any ideas? File was downloaded with your tool.

Thank you!

Recovering Bip 39 passphrase?

Hello,
I know my BIP39 24 word Mnemonic and I know the public key / address that I need to access. It's an Ethereum address.
I need to find out the BIP39 passphrase.
Can I use btcrecover to search through passphrase variations?
Thanks

Not using all GPU memory

Its a bitcoin core wallet, on ubuntu 14.04 on AWS. No matter what, it will not go above ~38mb on each thread/gpu. This is at full computer/in pwd. Any ideas on settings?

Fri Apr 14 03:02:14 2017
+-----------------------------------------------------------------------------+
| NVIDIA-SMI 375.51 Driver Version: 375.51 |
|-------------------------------+----------------------+----------------------+
| GPU Name Persistence-M| Bus-Id Disp.A | Volatile Uncorr. ECC |
| Fan Temp Perf Pwr:Usage/Cap| Memory-Usage | GPU-Util Compute M. |
|===============================+======================+======================|
| 0 GRID K520 On | 0000:00:04.0 Off | N/A |
| N/A 30C P0 42W / 125W | 40MiB / 4036MiB | 0% Default |
+-------------------------------+----------------------+----------------------+
| 1 GRID K520 On | 0000:00:05.0 Off | N/A |
| N/A 33C P0 42W / 125W | 40MiB / 4036MiB | 0% Default |
+-------------------------------+----------------------+----------------------+
| 2 GRID K520 On | 0000:00:06.0 Off | N/A |
| N/A 31C P0 41W / 125W | 40MiB / 4036MiB | 0% Default |
+-------------------------------+----------------------+----------------------+

+-----------------------------------------------------------------------------+
| Processes: GPU Memory |
| GPU PID Type Process name Usage |
|=============================================================================|
| 0 3190 C python 38MiB |
| 1 3190 C python 38MiB |
| 2 3190 C python 38MiB |
+-----------------------------------------------------------------------------+

no module named google.protobuf

followed the instructions to a T trying to extract spending pin from google android wallet and repeatedly getting the error of "importerror: No module named google.protobuf" using windows 7

fixed it, found in your bitcoinj thread the command for installing google protobuf module is "C:\Python27\Scripts\pip install protobuf pylibscrypt" you have it listed on the install page as "C:\Python27\Scripts\pip install pylibscrypt" might want to change that for the complete noobs who want to get their .1btc back

Password being found but it's not correct?

So I tried to use btcrecover on a strongcoin key I have(same as bitcoin android/multibit.. I tried it before against a known password on a key), I ran it and it said password found, tried a few more times, found everytime, but then I try to decrypt with openssl and using the strongcoin website and using multibit.. all throw a password incorrect, So I tried to output the contents of "b58_privkey" variable after this line:

b58_privkey = l_aes256_cbc_decrypt(key1 + key2, iv, encrypted_block)

and it's just a lot of rubbish that makes my CMD window crash.

here is what I get from openssl:

KpVuZ1ryWPTsQ6g2mI[n▬<¾·_϶┌îØNXçLµp╦<&Ë▬┤╗ZÙò}¼bad decrypt

Is that why.. it starts with K

edit: so I figure it's because there is a 1/300billion chance of finding an incorrect password that when running long char bruteforce that it messes up :/ Any additional checks can be done to make sure its correct?

Error Attempting to Open Bither File

I got the following error after following the tutorial with my Bither Wallet:

btcrecover.py: error: unexpected encrypted key length in Bither Wallet.

Looking for a potential resolution.

No tokens or words but a fixed length

Hi,

Is there is a way to brute force a password of a fixed length? I am pretty sure it is 8 characters and I am retty sure I mixed special characters, small, capital and numbers. So can I with tool brute force it telling teh tool to only look for 8-10 characters password?

Thanks

False positive????

I wonder if it is possible that the program returns a "false positive". The issue is that after a difficult period of brute force, the program has given me a password that always gives me as "password found", but when I try to unlock the account, "bitwallet" keeps telling me that the password is incorrect.

Likewise report that the alleged password does not contain unrecognized characters and is shaped through a crucible and convinations own passwords (using a token.txt).

support for BIP-32/39/44 where SEED is known but password has typo

Seeking support for BIP-32/39/44 use case where person has full correct seed, however has made a typo in the password used. In this particular instance it's regarding the trezor. The trezor supports/allows you to type any password and it will generate bitcoin addresses based on that password. If password is mispelled or typo it will still produce addresses.
In this example I have 2 addresses generated with wrong password, and the password (however there is a typo).

Excellent software and instructions and was able to get seedrecover.py working, however in tutorial did not see this capability and in wizard was not able to see how typo password could be resolved.
Apologies if this is the wrong area to submit this but wasn't sure what other way to ask this/communicate with Gurnec.

Order of words in seed recovery

Hi Gurnec.

Thank you for a great tool. I'm trying to recover Mycelium on Android seed. I have 34 words, 12 of which are the seed and I'm sure about the order of the words in the seed.

How to tell to seedrecover.py to keep the order of provided words. I think it would greatly decrease the number of options.

Thanks.

Found line return in passphrase?

I believe I am missing a character or 2 from my passphrase. I ran my password through btrecover with %P wildcard at the end. It said it found the password. The issue is it is indicated that a line return character was the missing character. How would that even be entered into the passphrase? Really appreciate any help!

Add support for Bitcoin Wallet for Android spending PINs

Recovery of the password of an encrypted backup is supported. Recovery of a spending PIN of the wallet file itself is also supported (but you need a rooted phone to get that wallet file).

What's not yet supported is recovery of a spending PIN inside an encrypted backup (where you know the password of the encrypted backup). If you're not rooted, this would be the only way to recover a spending PIN.

@YahyaB this might help you with schildbach/bitcoin-wallet#216, once added.

blockchain v0.0 test wallet password

Could you please provide the password for the file found in:

btcrecover-master/test-wallets/blockchain-v0.0-wallet.aes.json

So I can test if my setup is working against my own Blockchain V0 wallet?

download-blockchain-wallet.py fails when email or IP verification is enabled

When email or IP verification is enabled, the script asks you to check your email. When you click on the link in your email from blockchain.info, click Authorize, and then tell the script to retry the download, it should complete the download (or move on to the 2FA step if necessary). Instead it tells you to check your email again.

Unable to recover from Multibit WALLET file

Hi, I am able to recover pass with KEY file, but when I put WALLET file instead it is not possible and gives that error:

Do you know where can be problem, I need to recover pass with only Wallet file.

Thanks

btcrecover.py: notice: for MultiBit, use a .key file instead of a .wallet file if possible
Using 8 worker threads
Traceback (most recent call last):
File "C:\btcrecover-master\btcrecover.py", line 36, in
(password_found, not_found_msg) = btcrpass.main()
File "C:\btcrecover-master\btcrecover\btcrpass.py", line 5224, in main
pool = multiprocessing.Pool(spawned_threads, init_worker, (loaded_wallet, tstr))
File "C:\Python27\lib\multiprocessing_init_.py", line 232, in Pool
return Pool(processes, initializer, initargs, maxtasksperchild)
File "C:\Python27\lib\multiprocessing\pool.py", line 159, in init
self._repopulate_pool()
File "C:\Python27\lib\multiprocessing\pool.py", line 223, in _repopulate_pool
w.start()
File "C:\Python27\lib\multiprocessing\process.py", line 130, in start
self._popen = Popen(self)
File "C:\Python27\lib\multiprocessing\forking.py", line 277, in init
dump(process_obj, to_child, HIGHEST_PROTOCOL)
File "C:\Python27\lib\multiprocessing\forking.py", line 199, in dump
ForkingPickler(file, protocol).dump(obj)
File "C:\Python27\lib\pickle.py", line 224, in dump
self.save(obj)
File "C:\Python27\lib\pickle.py", line 331, in save
self.save_reduce(obj=obj, *rv)
File "C:\Python27\lib\pickle.py", line 425, in save_reduce
save(state)
File "C:\Python27\lib\pickle.py", line 286, in save
f(self, obj) # Call unbound method with explicit self
File "C:\Python27\lib\pickle.py", line 655, in save_dict
self._batch_setitems(obj.iteritems())
File "C:\Python27\lib\pickle.py", line 687, in _batch_setitems
save(v)
File "C:\Python27\lib\pickle.py", line 286, in save
f(self, obj) # Call unbound method with explicit self
File "C:\Python27\lib\pickle.py", line 568, in save_tuple
save(element)
File "C:\Python27\lib\pickle.py", line 286, in save
f(self, obj) # Call unbound method with explicit self
File "C:\Python27\lib\pickle.py", line 554, in save_tuple
save(element)
File "C:\Python27\lib\pickle.py", line 331, in save
self.save_reduce(obj=obj, *rv)
File "C:\Python27\lib\pickle.py", line 425, in save_reduce
save(state)
File "C:\Python27\lib\pickle.py", line 286, in save
Traceback (most recent call last):
File "", line 1, in
f(self, obj) # Call unbound method with explicit self
File "C:\Python27\lib\multiprocessing\forking.py", line 381, in main
File "C:\Python27\lib\pickle.py", line 655, in save_dict
self = load(from_parent)
File "C:\Python27\lib\pickle.py", line 1384, in load
self._batch_setitems(obj.iteritems())
File "C:\Python27\lib\pickle.py", line 687, in _batch_setitems
return Unpickler(file).load()
File "C:\Python27\lib\pickle.py", line 864, in load
save(v)
File "C:\Python27\lib\pickle.py", line 331, in save
dispatchkey
File "C:\Python27\lib\pickle.py", line 886, in load_eof
self.save_reduce(obj=obj, *rv)
File "C:\Python27\lib\pickle.py", line 400, in save_reduce
raise EOFError
EOFError
save(func)
File "C:\Python27\lib\pickle.py", line 300, in save
self.save_global(obj)
File "C:\Python27\lib\pickle.py", line 754, in save_global
(obj, module, name))
pickle.PicklingError: Can't pickle <class 'wallet_pb2.ScryptParameters'>: it's not found as wallet_pb2.ScryptParameters

[Feature Req] Electrum wallet with only imported keys

Hi,

Trying to recover a password on an Electrum wallet that was not created in the 'normal' way.

It's just a passworded Electrum wallet with an imported key. Btcrecover doesn't seem to be able to make heads or tails out of it. Instead of seed, etc, I just have 'keystore' and 'keypairs' section in the wallet.

They look something like this:
"keystore": {
"keypairs": {
"04d0074789a89ee39eef5cccf13d0c4aa02d6db4fc02ada2ee1354f6b50bca4204aa0f18f94ea1b88d0d81924
fe0d65dd5514db881b1158a53d072818ef6fa2ed9": "a5UBXagn/GdGHvCMsu25dCbpqZ21tiqyyFMjr8sTJwN0TbZDhu0yqaAiQ
MciO+5VNoy0S6SiN41rpCWoM1Hie47tVSB5jOJg43yeF667KCc="
},
"type": "imported"
},

(Obviously changed/obfuscated)
Can btcrecover make use of these?

Thanks

Spaces between Tokens

Hello, would it be possible to implement a option something like --with-spaces or something to add a space between each Token , i know there is the wildcard %s but this would put the space after the last token too.

Best Regards

Additional instructions for macOS (python)

Please add the following information to the existing documentation:

Python on macOS comes without bsddb support, ergo the bsddb3 python module that btcrecover relies upon will complain about the missing _bsddb symbol in that module.
The way to solve this using brew is: brew install python --with-berkeley-db4. Then make sure you open a new terminal instance to run the new python from the Cellar and not the old python (macOS's one).
Or simply exec the binary like this in your console after installation: $(brew --cellar)/python/2.7.11/bin/python ./btcrecover.py ... ... (or whichever version/path is related to your OS).

Notes:
May require brew install berkeley-db4 prior.

References:

Difficulties with --android-pin option

I am using the Bitcoin Wallet app on my Android phone, and I forgot the spending pin. I tried btcrecover a few times on my main wallet and got nothing. I decided to create a new wallet on my tablet to make sure that btcrecover was working properly, and that I knew how to use it.

The new wallet has no Bitcoin in it, and the spending pin is 1234. The password for the backup file is 'password'. I put the wallet backup file in the btcrecover directory, and I put '%1,4d' in my tokenlist. Then I ran the following command:

python btcrecover.py --wallet Bitcoin-Wallet-backup --tokenlist tokens.txt --android-pin

It asks me for the password for the wallet, and I type in 'password'. After about a minute, it says "Password search exhausted". I ran

python btcrecover.py --tokenlist tokens.txt --listpass | more

and I see '1234' on the list. I also tried using a password list instead of a token list, and I tried both options with and without sudo.

I am on Elementary OS 0.4 Loki 64 Bit, which is based on Ubuntu 16.04 Xenial. I have 8GB RAM and an i7-4510U processor.

Any ideas why btcrecover is not finding my pin or suggestions on where to go next would be very much appreciated!

Cloud computing to run the script

I know it's not an issue but do you know of some cloud computing (for free best - Google Cloud, MS Azure, ...) that can be used to run this script - it has all libraries etc? I have probably set 8 character spending PIN and my computer shows over 250 days ETA :-)
Thanks for any suggestions.

Constant Errors in Terminal

Im terrribly sorry I am quite new, I could be missing something or even running it through the wrong program but nothing seems to work. and help would be greatlty appreciated! uploaded what I see. It's the run all tests file.

Thanks!

edit: secondary note having seen the install.MD I eep getting asked for a password for amnesia without able to type anything in.

New update did that, installed it all.

Still same erors. I'm using Tails if this makes any difference, and not sure where the location of python is which I think the shebang is used for.
screenshot from 2017-01-02 18 15 23

ASCII Code over 127

My Password contains a character with is ASCII >127. Could you please tell me, how to enter this to the token list, and if not possible, make an Option for it in the program?
Thanks for the good work!

global name 'cl_kernel' is not defined

Hi, running btcrecover on Windows kept giving me following error:

C:\Python27\python.exe btcrecover.py --wallet wallet.dat --performance --enable-gpu --global-ws 4096 --local-ws 512
--gpu-names #2
Traceback (most recent call last):
  File "btcrecover.py", line 4859, in <module>
    parse_arguments(sys.argv[1:])
  File "btcrecover.py", line 2904, in parse_arguments
    loaded_wallet.init_opencl_kernel(devices, args.global_ws, args.local_ws, args.int_rate, *extra_opencl_args)
  File "btcrecover.py", line 751, in init_opencl_kernel
    max_local_ws = cl_kernel.get_work_group_info(pyopencl.kernel_work_group_info.WORK_GROUP_SIZE, device)
NameError: global name 'cl_kernel' is not defined

So I changed in line 721 cl_kernel.get_work_group_info to self._cl_kernel.get_work_group_info

Is that an issue or am I just doing something wrong? Cause after my change it seems to work fine.

subtract a subset of tokens

Sorry if this is the wrong place for a feature request, but it would be wonderful if there was a way to subtract a subset of tokens from the search. For example, if one tokenlist is exhausted, it would enable the user to add tokens but avoid repeating previous combinations. something like:

original tokenlist.txt -
alice ALICE
bob BOB
1234

new tokenlist.txt -
--/
alice ALICE
bob BOB
1234
/--
carl CARL
4321

etc.
or is there currently a way to do this manually somehow?

Error extracting data.

Following the example for a Multibit Classic Key I run into the following error and I've been unable to track it down..

python btcrecover.py --data-extract --tokenlist ../wordlist.txt
Please enter the data from the extract script
{entered my data from extract-script/extract-multibit-privkey.py}
btcrecover.py: error: on line 17: invalid wildcard (%) syntax (use %% to escape a %)

I'm using Python 2.7.9 on Debian.

run-all-tests.py returns "ImportError: No module named CppBlockUtils"

I can't seem to find any fix online for the missing CppBlocksUtils. Any help would be appreciated. I'm attempting to decrypt an Electrum wallet.

Traceback (most recent call last):
  File "run-all-tests.py", line 54, in <module>
    from btcrecover.test import test_passwords, test_seeds
  File "/Users/felipefaria/Desktop/btcrecover-master/btcrecover/test/test_seeds.py", line 39, in <module>
    from .. import btcrseed
  File "/Users/felipefaria/Desktop/btcrecover-master/btcrecover/btcrseed.py", line 38, in <module>
    from CppBlockUtils import CryptoECDSA, SecureBinaryData
ImportError: No module named CppBlockUtils

Edit: Fixed

I delved into the code and found that run-all-tests.py is dependent on Armory being install according to btcrpass.py, no matter what wallet you intend on decrypting.

    elif sys.platform == "darwin":  # untested
        sys.path.append("/Applications/Armory.app/Contents/MacOS/py/usr/lib/armory")
    is_armory_path_added = True

After installing Armory.app this specific error was fixed.

Need comand for run btcrecover on Kubuntu

Hello.
I think maybe you've can help me...
I download the btcrecover and unzip home\btcrecover-master.(OS KUBUNTU)
Move into this folder wallet.dat.
Which comands i must type in the terminal for btcrecover.py search password?
Where i can read this.
I no want take you time.but i no see any way.
Thanks.

GPU not working as expected??

Working on a doge core wallet
Dummy password list

123
12345
4321 <-- right pass

Regular search finds the password.

Password found: '4321'

While enabling GPU: --enable-gpu --global-ws 4096 --local-ws 256 --no-eta

Using OpenCL GPU AMD Radeon HD Tahiti XT Prototype Compute Engine
| 3  elapsed: 0:00:04  rate:   1.07  P/s
Password search exhausted

Secondary Password recovery

I hadn't signed into my wallet in a few years and when I tried it was asking for my secondary password to update the program. I know the first part of the password but can not figure out the rest. Any help would be appreciated, I can send some bitcoin as payment (I actually don't know how much is in my wallet).

Password minimum/maximum length

Is there any way to specify a minimum or maximum password length when using tokens to generate a password list? --max-tokens and --min-tokens don't quite trim down the possibilities enough.

For example if I know the password is 10-15 characters and I have a list with tokens 1-8 characters long, combining two 8-character tokens will make a useless password guess, but there are potentially usable passwords from combining up to eight tokens (one 8-char and seven 1-chars).

Thanks for all the detailed docs!

Seed recover, bit confused about the options

Hello Gurnec, thanks for the great tool.

I have a partial seed of 11 words for Electrum. Can't recall if it was 12 or 13 words.
What I do know is that I made no mistakes in the words.

Would using " python seedrecover.py --wallet wallet --mnemonic-length 12 --close-match 1.00" and then switching length to 13 iterate through the whole space?

Thanks.

Special character in BTC core password not recognized

Hello,

I suspect I had the special charachter ï in my password. So that is the letter i but with two dots on the i.
I have used the makefile file to add Unicode support. But when I run the btcrecoveru.py file I still get errors because the character ï is not recognized. below is the snipper of the CMD.

What can I do ? Please help?

C:\Users\user\desktop\btcrecover-master>btcrecoveru.py --wallet wallet.dat --
tokenlist tokU.txt
Traceback (most recent call last):
File "C:\Users\user\desktop\btcrecover-master\btcrecoveru.py", line 4952, i
n
parse_arguments(sys.argv[1:])
File "C:\Users\user\desktop\btcrecover-master\btcrecoveru.py", line 2510, i
n parse_arguments
if tokenlist_file and tokenlist_file.peek() == "#": # if it's either a comm
ent or additional args
File "C:\Users\user\desktop\btcrecover-master\btcrecoveru.py", line 2194, i
n peek
self._peeked = self._file.read(1)
File "C:\Python27\lib\codecs.py", line 314, in decode
(result, consumed) = self._buffer_decode(data, self.errors, final)
File "C:\Python27\lib\encodings\utf_8_sig.py", line 66, in _buffer_decode
return codecs.utf_8_decode(input, errors, final)
UnicodeDecodeError: 'utf8' codec can't decode byte 0xcf in position 28: invalid
continuation byte

Run against wordlist

Seems like you need to implent a function to run some extracted keys against a simple generated wordlist.

2.147bil limit

Running 1-7 lower/digit don't work because it hits the 2.147bil limit :/

Can't find scrypt library

Android btc spending pin. Getting the error of can't find scrypt library and that performance will be severely degraded. Followed the instructions to install scrypt and even uninstalled and reinstalled both 32 bit and 64 bit versions of everything. Can only try spending pins up to 5 digits because 6 digits will take >168 hours. trying 5 digits but I'm thinking it was probably 6 digits. It'll be 4 days before its done with 5 digits.

BIP39 GPU

Great piece of software! Adding BIP39 passphraze recovery with GPU would be useful for me. Do you plan to go in this direction?

Armory 32/64 mismatch

When i run all tests i get:
run-all-tests.py: error: can't load Armory, 32/64 bit mismatch between it and Python
.run-all-tests.py: warning: No module named pyopencl

I tried both of versions of Armory mentioned in the installation guides - same error. I can't be exactly sure which version of Python 2.7 i have because i did not choose it, but the installer is .msi which should mean that it's x64 right?
And all other scripts i tried to install - 32 versions won't install, but x64 will, so it's safe to assume i got x64 right?
When i run the btcrecover.py i get:
btcrecover.py: warning: can't find an scrypt library, performance will be severely degraded
and it really is slow, like trying 1 pwd each minute. What should i check?

working on a Bither wallet i mistyped pwd for.

NIP39 GPU

Great piece of software! Adding BIP39 passphraze recovery with GPU would be useful for me. Do you plan to go in this direction?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.