@fxsniper already answer your question. But i'd like to let you know there's thread discussing that tool at lattice-attack || how to run without error.
It was the Bitcointalk forum that inspired us to create Bitcointalksearch.org - Bitcointalk is an excellent site that should be the default page for anybody dealing in cryptocurrency, since it is a virtual gold-mine of data. However, our experience and user feedback led us create our site; Bitcointalk's search is slow, and difficult to get the results you need, because you need to log in first to find anything useful - furthermore, there are rate limiters for their search functionality.
The aim of our project is to create a faster website that yields more results and faster without having to create an account and eliminate the need to log in - your personal data, therefore, will never be in jeopardy since we are not asking for any of your data and you don't need to provide them to use our site with all of its capabilities.
We created this website with the sole purpose of users being able to search quickly and efficiently in the field of cryptocurrency so they will have access to the latest and most accurate information and thereby assisting the crypto-community at large.
mausuv, What is that number?
Point1 = (x1,y1)
Point2 = (x2,y2)
Point3 = sub(Point1,Point2)
Point4 = add(Point1,Point2)
Point5 = div(Point1,2) # remove Scalar option, i need two point use div Point5 = div(Point1,Point2)
Point6 = mul(Point1,2) # remove Scalar option, i need two point use mul Point6 = mul(Point1,Point2)
#modify please
def ECdiv(Qx,Qy,Scalar): # EC point division remove Scalar option
A = (N-1)/Scalar
Px,Py = ECmul(Qx,Qy,A)
Py = P-Py
return Px,Py
Dx,Dy = ECdiv(Cx,Cy,2)
print (Dx,Dy)
mausuv, What is that number?
Point1 = (x1,y1)
Point2 = (x2,y2)
Point3 = sub(Point1,Point2)
Point4 = add(Point1,Point2)
Point5 = div(Point1,2) # remove Scalar option, i need two point use div Point5 = div(Point1,Point2)
Point6 = mul(Point1,2) # remove Scalar option, i need two point use mul Point6 = mul(Point1,Point2)
#modify please
def ECdiv(Qx,Qy,Scalar): # EC point division remove Scalar option
A = (N-1)/Scalar
Px,Py = ECmul(Qx,Qy,A)
Py = P-Py
return Px,Py
Dx,Dy = ECdiv(Cx,Cy,2)
print (Dx,Dy)
01000000 //message version
01 //NUM OF INPUT
B9C222461DE38F9FCDC121A47E27C5A08932232B00ADC1E2C3FBFB55041B9422 // PROV HASH
01000000 // PROV HASH INDEX
6A4730440220 //SCRIPT LEN 0x6A + SCRIPT DATA 0x47 WITH R,S,X point compressed or full pub key
503434F27F0D5DC23C01A5D2B2B2ABB902E2816987515DAFA619FFDED8FC2EC6 // R
0220
4C30C0B82C9AFD623E140BF2D6BADFA2F02414EF3FFC603E83F2F65A264CE2B8 // S
0121
0355D77643F9BBCCDE7A1F05D8FA72C0B6C53075CDC299753242320EF9C6611233 //PUB KEY X POINT
FFFFFFFF //SEQ
01 //NUM OF OUTPUT
905F010000000000 // OUTPUT AMOUNT
1976A914
B95BFE11C932408AE44DA26872B3C8CD5D61691A // OUTPUT ADDRESS
88AC
00000000
OUTPUT ADDRESS mxR3WHpKxCjgYvoh5VS72HF2y8HHfhZfKG
6F //TEST NET
B95BFE11C932408AE44DA26872B3C8CD5D61691A //ADDRESS
D05ED3BB //CHECKSUM
INPUT ADDRESS mpPQhMr2CuRn1AQJgCmcMhH8PgrYaKknSa
6F //TEST NET
614BD7EF80E1105FC86895D339EFF49A9C56BDAD //ADDRESS
7A6D71D7 //CHECKSUM
01000000 //message version
01 //NUM OF INPUT
B9C222461DE38F9FCDC121A47E27C5A08932232B00ADC1E2C3FBFB55041B9422 // PROV HASH
01000000 // PROV HASH INDEX
1976A914
614BD7EF80E1105FC86895D339EFF49A9C56BDAD //INPUT ADDRESS
88AC
FFFFFFFF //SEQ
01 //NUM OF OUTPUT
905F010000000000 //OUTPUT AMOUNT
1976A914 // SCRIPT DATA
B95BFE11C932408AE44DA26872B3C8CD5D61691A // OUTPUT ADDRESS
88AC
00000000 //LOCK TIME
01000000 //SHA2
Traceback (most recent call last):
File "RawTX_RSZ.py", line 13, in
s = keyUtils.derSigToHexSig(m[1][:-2])
File "/home/runner/btc-rsz/keyUtils.py", line 32, in derSigToHexSig
x, s = ecdsa.der.remove_integer(s)
File "/usr/local/lib/python2.7/dist-packages/ecdsa/der.py", line 218, in remove_integer
raise UnexpectedDER("Negative integers are not supported")
ecdsa.der.UnexpectedDER: Negative integers are not supported