Reddit Posts
Mentions
Ok, I got bored and wrote a python script for you that will unlock your backup file. Here's how to do it. * 1. Download and install python [https://www.python.org/downloads/](https://www.python.org/downloads/) * 2. Once installed, open up a command prompt and type "pip install pycryptodome" (without the quotations). * 3. Make a new folder. In that folder put your backup file. * 4. In the same folder, make a new file called "decrypter.py". * 5. Open [decrypter.py](http://decrypter.py) in notepad and paste the following code: ​ from Crypto.Cipher import AES from Crypto.Hash import MD5 import base64 def openssl_key_iv_derivation(password, salt, key_len, iv_len): d = d_i = b'' while len(d) < key_len + iv_len: d_i = MD5.new(d_i + password + salt).digest() d += d_i return d[:key_len], d[key_len:key_len+iv_len] def decrypt_openssl(enc_file_path, dec_file_path, password): with open(enc_file_path, 'rb') as f: enc_data = f.read() enc_data = base64.b64decode(enc_data) if enc_data[:8] != b"Salted__": raise ValueError("Missing OpenSSL salt header") salt = enc_data[8:16] ciphertext = enc_data[16:] key, iv = openssl_key_iv_derivation(password.encode(), salt, 32, 16) cipher = AES.new(key, AES.MODE_CBC, iv) decrypted = cipher.decrypt(ciphertext) padding_length = decrypted[-1] decrypted = decrypted[:-padding_length] with open(dec_file_path, 'wb') as f: f.write(decrypted) # Variables needed: decrypt_openssl('NAMEOFYOURFILE', 'decryptedfile.txt', 'blabla') Replaced NAMEOFYOURFILE with the actual name of your file, and MYPASSWORD with your actual password. Then save the file. * 6. Open up CMD and navigate to your folder. Type "py decrypter.py". * 7. A new file should appear in your folder called decryptedfile.txt. If you open it you'll notice it is mostly gibberish, but if your password is correct a twelve word seed phrase should appear at the top of the file. If it's not there and all you see if random characters, you got your password wrong. * 8. Open Electrum. Choose File > New/Restore > Standard Wallet > I already have a seed. * 9. Paste your seed, then click options and choose "BIP39 seed". Click next. * 10. If your addresses start with bc1q.... then choose native segwit and type " m/1' " (note the ') in the derivation path. 11. If your addresses are older (possible from 2014), choose legacy and type " m/0' " (again not the ') in the derivation path. This will restore all your wallet address. **Once done, send your coins to a new wallet because you now have an unencrypted seed phrase on your PC.**
Ok, I got bored and wrote a python script for you that will unlock your backup file. Here's how to do it. 1. Download and install python [https://www.python.org/downloads/](https://www.python.org/downloads/) 2. Once installed, open up a command prompt and type "pip install pycryptodome" (without the quotations). 3. Make a new folder. In that folder put your backup file. 4. In the same folder, make a new file called "decrypter.py". 5. Open [decrypter.py](http://decrypter.py) in notepad and paste the following code: `from Crypto.Cipher import AES` `from Crypto.Hash import MD5` `import base64` `def openssl_key_iv_derivation(password, salt, key_len, iv_len):` `d = d_i = b''` `while len(d) < key_len + iv_len:` `d_i = MD5.new(d_i + password + salt).digest()` `d += d_i` `return d[:key_len], d[key_len:key_len+iv_len]` `def decrypt_openssl(enc_file_path, dec_file_path, password):` `with open(enc_file_path, 'rb') as f:` `enc_data = f.read()` `enc_data = base64.b64decode(enc_data)` `if enc_data[:8] != b"Salted__":` `raise ValueError("Missing OpenSSL salt header")` `salt = enc_data[8:16]` `ciphertext = enc_data[16:]` `key, iv = openssl_key_iv_derivation(password.encode(), salt, 32, 16)` `cipher = AES.new(key, AES.MODE_CBC, iv)` `decrypted = cipher.decrypt(ciphertext)` `# Remove PKCS#7 padding` `padding_length = decrypted[-1]` `decrypted = decrypted[:-padding_length]` `with open(dec_file_path, 'wb') as f:` `f.write(decrypted)` `# Variables needed:` `decrypt_openssl('NAMEOFYOURFILE', 'decryptedfile.txt', 'MYPASSWORD')` Replaced NAMEOFYOURFILE with the actual name of your file, and MYPASSWORD with your actual password. Then save the file. 6. Open up CMD and navigate to your folder. Type "py decrypter.py". 7. A new file should appear in your folder called decryptedfile.txt. If you open it you'll notice it is mostly gibberish, but if your password is correct a twelve word seed phrase should appear at the top of the file. If it's not there, you got your password wrong. 8. Open Electrum. Choose File > New/Restore > Standard Wallet > I already have a seed. 9. Paste your seed, then click options and choose "BIP39 seed". Click next. 10. If your addresses start with bc1q.... then choose native segwit and type " m/1' " (note the ') in the derivation path. 11. If your addresses are older (possible from 2014), choose legacy and type " m/0' " (again not the ') in the derivation path. This will restore all your wallet address. Once done, send your coins to a new wallet because you now have an unencrypted seed phrase on your PC.
he has activated WAR MODE and is working out
You’re wasting your time trying to reason with someone who’s brainwashed. He can’t help himself, that’s why he brought AOC and Bernie into this. His brain went full POLITICS MODE:
its going to ZERO! PANIC MODE :P
Turbo turned on TURBO MODE 🚀🚀🚀
From memecoins Ski mask dog, Ski cat, Okayeg and MANEKI. Do your own research on this coin and you will see big potential, I already made some profit From alt coins - RWA inc, FET, MODE, Mantra
In case of not wanting that library this is the more “manual” approach : import hashlib import base58 from Crypto.Cipher import AES def sha256(data): “””Calculate SHA-256 hash.””” return hashlib.sha256(data).digest() def bip38_decrypt(encrypted_key, passphrase): “”” Decrypts a BIP38 encrypted private key using a passphrase. Args: encrypted_key (str): The BIP38 encrypted private key in Base58Check format. passphrase (str): The passphrase used to encrypt the key. Returns: str: The decrypted private key in hexadecimal format, or an error message. “”” # Step 1: Decode the encrypted key from Base58Check try: decoded = base58.b58decode_check(encrypted_key) except Exception as e: return f”Error: Invalid Base58Check encoding - {e}” # Check prefix (0x0142 for non-EC-multiplied keys) if decoded[:2] != b’\x01\x42’: return “Error: Unsupported BIP38 key format (only non-EC-multiplied supported).” # Step 2: Extract the payload flag_byte = decoded[2] encrypted_part1 = decoded[3:19] encrypted_part2 = decoded[19:35] # Check if no compression (flag_byte == 0xC0) if flag_byte != 0xC0: return “Error: Unsupported BIP38 flag byte (only non-compressed keys supported).” # Step 3: Generate the passphrase-derived key passphrase = passphrase.encode(‘utf-8’) passphrase_hash = sha256(sha256(passphrase)) derived_key = passphrase_hash[:16] # Step 4: Decrypt the two parts using AES cipher = AES.new(derived_key, AES.MODE_ECB) decrypted_part1 = cipher.decrypt(encrypted_part1) decrypted_part2 = cipher.decrypt(encrypted_part2) # Step 5: Combine decrypted parts and verify private_key = decrypted_part1 + decrypted_part2 return private_key.hex() # Example usage if __name__ == “__main__”: # Replace these values with your actual encrypted key and passphrase encrypted_key = input(“Enter BIP38 encrypted private key: “).strip() passphrase = input(“Enter your passphrase: “).strip() decrypted_key = bip38_decrypt(encrypted_key, passphrase) if decrypted_key.startswith(“Error”): print(decrypted_key) else: print(f”Decrypted Private Key (hex): {decrypted_key}”)
Super bullish, u didnt even mention 5000 new holders this week! We're currently breaking ATH, and then: PRICE DISCOVERY MODE!
With $23 million of exit liquidity he definitely went BEAST MODE on the scam and rugged way more than 10k people
Do this trust me! Buy blockstream jade Use the QR MODE so that it’s STATELESS and never connected download Bluewallet open a watch only on alley / use it as a signing device
$Buddy on base will be top 🚀 Why I bet on Buddy for the bull? Because this coin is not the typical meme coin, there is a purpose. I share with you the roadmap that will be amazing 1️⃣ Buddy Battles - SIMPLE MODE: Bet $BUDDY and get paired with another player(s). Winner is chosen randomly. 2️⃣ Buddy Battles - MEME BATTLES: Battle other holders with your meme creations and bet $BUDDY. Winners take the losers’ bets, chosen by a voting system where votes are bets, allowing people to earn more if they choose the winner. 3️⃣ Expand the Ecosystem: Allow other teams to use the meme creator and battle system for their tokens, creating a vibrant ecosystem. I invite you to join our tg and be free to ask whatever you need to know, the dev is legit and he is working so hard everyday. Ca: 0x3C4C68236774B3cDA9647D5bc534Ab3841B3BfbF
WHERE ARE THE BEARS WHERE IS 52K FOLKS??? That's right looks like they were WRONG AGAIN. This sub was going on full PANIC MODE with the naysayers claiming to be dumping their coins, probably only worth 3 digits, and trying to spread FEAR UNCERTAINTY AND DOUBT into the hearts of the brave investors We are on the absolute CUSP of reaching uncharted territory on a voyage of price discovery of NEW ALL TIME HIGHS fellas The conditions are right, we are in a POST HALVING POST ETF world, we have Jerome POWELL PATRON SAINT of the ECONOMY watching over us. It's gonna be a great 9 months folks it's been an honor holding these bags with my fellow bulls BTC 200K EOY AVAX TO 500 BULLS WIN