The FinderOuter is a bitcoin recovery tool that focuses on making the recovery process easy for everyone with any level of
technical knowledge. It uses a simple user interface with a list of recovery options. Each option has an explanation and many
hints helping user figure out what is needed. It always consist of filling some text boxes and selecting some options and finally
clicking the Find
button. This eliminates the need to read long guide pages on how to use the application. Each option also has
some example cases that can show a simple preview of how each option should be filled for different cases.
FinderOuter is specialized for maximum efficiency, each recovery option and their parts are written from scratch and all those parts down to the basic cryptography used (such as SHA, ECC,...) are specialized for that operation.
Thanks to .Net core and AvaloniaUI FinderOuter
can run on all operating systems.
This project is written fully in C# and is 100% open source and will always remain free to use. You can make a donation if you found this tool useful.
FinderOuter is still in beta and under development. New features are slowly added and everything is optimized.
Contribution is always welcome. Please report any bugs you find or any improvement suggestions you have by creating a new
issue.
- Select an option from this list depending on what you want to recover
- Read the instructions
- Fill in the required information
- Select appropriate available options according to the entered data
- There are some useful advanced options to speed up the recovery
- Click Find button
- Reports are printed here as the program works on recovering your keys
- Progressbar showing the progress percentage shows up for options that use multi-threading (take more than a couple of seconds to complete)
- All recovery options come with examples, click this button repeatedly to cycle through them
- Some parts have a help button that brings up the respective FinderOuter knowledge base page
User can enter a message signature here to verify it. In case there is a problem with the message (except being an actually invalid signature), the code can search to find the common issues that some signing tools have and fix them.
This option can be used to recover any base-58 encoded string with a checksum that is missing some characters. For example
a damaged paper wallet where some characters are erased/unreadable. The position of missing characters must be known.
It works for (1) WIFs (Base-58 encoded private key)
(2) Addresses (Base-58 encoded P2PKH or P2SH address)
(3) BIP-38 (Base-58 encoded encrypted private key).
There is also a "special case" for private keys missing 1, 2 or 3 characters at unknown positions.
This option is similar to previous feature but works for base-16 (hexadecimal) private keys. Since there is no checksum in this encoding it requires an additional input to check each permutation against. It accepts any address type and public keys. This option is slower in comparison because it uses ECC and that is not yet optimized.
This option is similar to 2 and 3 but works for mini-privatekeys (eg. SzavMBLoXU6kDrqtUVmffv). It requires the corresponding address or public key of the minikey to check each possible key against, as a result it is also slower since it depends on ECC and has 2 additional hashes.
This option works for both BIP-39 and Electrum mnemonics that have some missing words. It requires knowing one child (private/public) key or address created from that seed and the exact derivation path of it.
This option is used to recover the extension words (aka passphrase) used in mnemonics. It works for both
BIP-39 and Electrum mnemonics algorithms. The available
passphrase recovery modes are:
a. Alphanumeric: This is when the passphrase consists of letter, numbers and symbols and is random. Example: OT!pA?8i
b. CustomChars: This mode allows user to define their own set of characters to be used in the passphrase.
c. soon
This option can recover passwords used in encrypting bitcoin private keys using the BIP-38 proposal. The available password recovery modes are the same as mnemonic passphrase option.
This option could be used to find derivation path of a child key (private key, public key or the address) by having the mnemonic or the extended master keys (xprv or xpub). It only checks a hard-coded list of popular derivation paths.
This option is used to recover Armory paper backups (containing 2 or 4 lines of 36 characters in Base-16 with custom char-set) that are missing some of their characters. Since the last 4 characters of each line is the checksum this option can be very fast (1 trillion keys/sec) if the checksum is available or extremely slow (100 key/sec) if not.
This option could be used to determine the encoding of an arbitrary text. It currently supports Base-16, Base-43, Base-58, Base-58 with checksum and Base-64. All inputs will be converted to hexadecimal.
Check out roadmap here: #47
- Optimization is always at the top of the to-do list
- File password recovery (user knows some parts of his password but not all and has the encrypted wallet file)
- SIMD code
- GPU support
You can ignore this step at your own risk and skip to step 2.
Since this project deals with sensative information such as private keys, mnemonics, etc. the safest approach is to run it
on a clean and air-gapped computer. Easiest way of acheiving that is using
a live Linux:
- Download Ubuntu or any other Linux OS (all FinderOuter releases are tested on 64-bit Ubuntu 20.04 before being published)
- Verify Ubuntu's iso (link)
- Follow step 2 while you are still online
- Disconnect network cable (to remain offline)
- Burn that ISO on a DVD or could be a USB disk (link)
- Boot into Ubuntu to run FinderOuter
- After you are done, shut down Ubuntu and remove the medium used in step 5
If you cannot or do not want to build you can go to releases where
the ready to run binaires are found for 3 different x64 operating systems: Windows, Linux and MacOS.
the other two files named Source code.zip
and Source code.tar.gz
are the project's source code that GitHub automatically adds
at that release version's commit.
To build FinderOuter:
If you have Visual Studio you can clone this repository and build the included
solution file called FinderOuter.sln.
Building is also possible through these steps using command line:
- Get Git: https://git-scm.com/downloads
- Get .NET 5.0 SDK: https://dotnet.microsoft.com/download (see
TargetFramework
in FinderOuter.csproj for the required .net version in case readme wasn't updated) - Clone FinderOuter
git clone https://github.com/Coding-Enthusiast/FinderOuter.git
- Build using
dotnet publish -c Release -r <RID> --self-contained true
(replace<RID>
with RID of the operating system you want to build for. e.g.win-x64
for x64 Windows orlinux-arm64
for Linux x64 ARM)
Important notes:
- Remember to build the project using
release
configuration to benefit from compiler optimizations. - .Net applications can be published as self contained which will
increase the size of the binray by including the required framework in it. That helps running the application on any computer
(like the live Linux explained above) without needing to install .Net separately. The size can be reduced by selecting the
Trim unused assemblies
option. - This project can be built on and used on any operating system, use
-r|--runtime <RUNTIME_IDENTIFIER>
to specify OS with the correct RID.
If you have compiled FinderOuter as SCD or downloaded the provided binaries there is no need to download .Net Core, otherwise it
has to be downloaded and installed on the system that needs to run FinderOuter.
FinderOuter can be run by using console/terminal command dotnet FinderOuter.dll
for Linux, dotnet FinderOuter
on MacOs and running the
FinderOuter.exe
on Windows.
Linux may require providing persmissions first
(more info):
- Provide execute permissions
chmod 777 ./FinderOuter
- Execute application
./FinderOuter
Please first check out conventions for information about coding styles, versioning, making pull requests, and more.
If You found this tool helpful consider making a donation:
Legacy address: 1Q9swRQuwhTtjZZ2yguFWk7m7pszknkWyk
SegWit address: bc1q3n5t9gv40ayq68nwf0yth49dt5c799wpld376s