Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

how to compile #8

Open
MAITHI19 opened this issue Jul 20, 2022 · 7 comments
Open

how to compile #8

MAITHI19 opened this issue Jul 20, 2022 · 7 comments

Comments

@MAITHI19
Copy link

hello sir please upload script with make file to compile

@ViktYusk
Copy link
Owner

Here you can find the compiled program for Windows:
https://github.com/ViktYusk/BitcoinBruteForcer/releases/tag/220604

@MAITHI19
Copy link
Author

please send command to run this file and cyzwin or cmd i must use this please help

@ViktYusk
Copy link
Owner

Just download bitcoin_brute_forcer_windows.rar, unzip it, and run bitcoin_brute_forcer.exe.

@MAITHI19
Copy link
Author

I'm getting error when I open in cmd or cycling [E] There are two required parameters

@ViktYusk
Copy link
Owner

Oh, I see. Run the command in cmd (for example):
bitcoin_brute_forcer 000000000000000000000000000000000000000000000000FC9602C 3EE4133D

000000000000000000000000000000000000000000000000FC9602C is the prefix of a hex private key, 3EE4133D is the prefix of a decoded address. Read the project description for details.

@MAITHI19
Copy link
Author

hello sir please share me download link with make file I will compile freshly and try to run

@mikorist
Copy link

mikorist commented Dec 29, 2023

Makefile for AMD Ryzen 9 7950X3D (Debian 11)

CXX = g++
CXXFLAGS = -std=c++11 -m64 -march=native -mtune=native  -msse2 -msse3 -msse4 -msse4.1 -msse4.2 -msse4a -mavx  -pthread -O2 -I.

SRCS = sha256.cpp ripemd160.cpp key.cpp point.cpp main.cpp test.cpp
OBJS = $(SRCS:.cpp=.o)
EXEC = bitcoin_brute_forcer

all: $(EXEC)

$(EXEC): $(OBJS)
	$(CXX) $(CXXFLAGS) $^ -o $@

%.o: %.cpp
	$(CXX) $(CXXFLAGS) -c $< -o $@

clean:
	rm -f $(OBJS) $(EXEC)


The presence of SSE4.1 and SSE4.2 instruction sets can be particularly beneficial for cryptographic operations, as they include instructions that can accelerate certain mathematical operations required for SECPK1 calculations.
You can experiment with these flags for cryptographic workloads.

Effectiveness of this flag depends on the specific algorithms and code you are working with. It's a good practice to benchmark code with and without the flag

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants