Skip to content
View demining's full-sized avatar

Block or report demining

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Chronoforge Attack: An Analysis of an ARM TrustZone Vulnerability — From Microsecond-Level Leakage to Full Compromise of Bitcoin Wallet Private Keys

1 Updated Mar 15, 2026

Shadow Key Attack: Threat of Nonce Leakage in Bitcoin Transactions via Euclidean Algorithm Side-Channel (EUCLEAK) in YubiKey 5 and Infineon MCU

1 Updated Feb 27, 2026

RAMnesia Attack: A Scientific Investigation of WireTap Threats to Bitcoin Infrastructure, Hardware Vulnerabilities (CVE-2025-6202, CVE-2023-39910), and Cryptanalytic Methods for ECDSA Key Recovery

1 1 Updated Feb 7, 2026

Phantom Signature Attack: An Analysis of the Critical Vulnerability CVE-2025-29774 in the Bitcoin Protocol, SIGHASH_SINGLE Implementation Flaws, and the Mathematical Framework for Private Key Recov…

1 Updated Jan 15, 2026

RingSide Replay Attack: Recovering the SEED → deriving Bitcoin wallet private keys and how 32-bit entropy instead of 256-bit led to the systematic compromise of crypto-asset funds.

3 Updated Jan 15, 2026

Scalar Venom Attack: A critical HSM initialization vulnerability (CVE-2025-60013) enables private Bitcoin wallet key recovery through buffer overflow exploitation and shell metacharacters in the F5…

3 1 Updated Nov 17, 2025

Pixnapping Attack: Compromising private keys and seed phrases through vulnerability CVE-2025-48561 represents a new critical threat to the Bitcoin network and Android infrastructure

15 2 Updated Oct 27, 2025

Phoenix Rowhammer Attack: Systemic Risk of Bitcoin Wallet Private Key Compromise in Global Blockchain Infrastructure Due to a Critical SK Hynix DDR5 Vulnerability (CVE-2025-6202)

Jupyter Notebook 5 2 Updated Oct 12, 2025

Bit-flipping attack on Wallet.dat: Risks of using AES-256-CBC without authentication, exploitation and extracting private keys from Bitcoin Core

Jupyter Notebook 6 3 Updated Sep 5, 2025

How CVE-2025-29774 Vulnerabilities and the SIGHASH_SINGLE Bug Threaten Multi-Signature Wallet Operational Methods with Fake RawTX

Jupyter Notebook 4 2 Updated Jul 23, 2025

Private key Debug: Incorrect generation of private keys, system vulnerabilities and errors in calculating the order of the elliptic curve secp256k1 threats to the Bitcoin ecosystem

Jupyter Notebook 3 1 Updated May 22, 2025

Bitcoin Cryptanalysis: CVE-2025-27840 Vulnerability in ESP32 Microcontrollers Puts Billions of IoT Devices at Risk via Wi-Fi & Bluetooth

Jupyter Notebook 11 4 Updated Mar 30, 2025

An attempt to predict the behavior of the properties of the secp256k1 Elliptic Curve: Cryptography and cryptocurrency related parameters secp256k1 reveals several vulnerabilities and potential thre…

Python 3 2 Updated Mar 18, 2025

Quantum Attacks on Bitcoin: Assessing Vulnerabilities and Developing Defense Strategies Against Emerging Quantum Computing Threats

Jupyter Notebook 2 1 Updated Mar 2, 2025

A fast, local neural text to speech system

C++ 10,845 960 Updated Aug 26, 2025

Discrete Logarithm mathematical methods and tools for recovering cryptocurrency wallets Bitcoin

Jupyter Notebook 9 2 Updated Jan 13, 2025

A self-contained cryptographic library for Python

C 3,226 553 Updated Mar 29, 2026

Research into Signature Malleability and Private Key Compromise in Bitcoin Signatures

Jupyter Notebook 3 1 Updated Nov 23, 2024

Jacobian Curve Coordinate Manipulation: Exploring the Vulnerability of a Fake Signature Using a Bitcoin Wallet Decodable File

Python 4 Updated Oct 30, 2024

Tutorials Power AI list and categories of Artificial Intelligence for Business

HTML 6 3 Updated Aug 8, 2024

Vector76 Attack: Researching and Preventing Threats to the Bitcoin Network Detailed Cryptanalysis Based on Real Data

Jupyter Notebook 7 6 Updated Oct 30, 2024

Search for critical vulnerabilities and new methods of protecting cryptocurrency Bitcoin & Ethereum

Jupyter Notebook 2 Updated Jun 4, 2024

Differential Fuzzing of Bitcoin protocol implementations and libraries

C++ 72 78 Updated Apr 21, 2026

ビットコイン暗号解析ツール

1 1 Updated May 29, 2024

비트코인 암호화 분석 도구

1 Updated May 29, 2024

Exploring Underrated Power of Bitcoin Utilities: comprehensive guide Google Colab and next big thing in cryptocurrency

Jupyter Notebook 5 Updated Feb 26, 2024

比特币密码分析工具

5 2 Updated May 29, 2024

In this study, we will look at the DeserializeSignature vulnerability, discovered in 2023, which allows attackers to create invalid signatures that can be accepted as valid by the Bitcoin network.

Jupyter Notebook 2 2 Updated Oct 30, 2024

Decrypting Passwords to Access Lost Bitcoin Wallets Using Gauss-Jacobi Method and Machine Learning Process BitcoinChatGPT

Jupyter Notebook 8 6 Updated Oct 30, 2024

Blockchain integration: API and web services capabilities for secure Bitcoin transactions

JavaScript 5 2 Updated Apr 14, 2024
Next