Please, do release the source of your vanity generator. I was about to warn people not to use it, because it is a closed source tool posted by a new user with 5 posts only. Can't be too paranoid after the incident we already had. Without the source, how does one know if your random prefix is really random?
The point of my registration on this board was to share the tool (thus low message count). It is indeed very unfortunate that there's been some hacking lately. I haven't released source code along with the binary because I was concerned it could've been repurposed into a password cracker.
Anyways, I've updated the tool with ability to search for an account number with given prefix and/or suffix and now releasing source code along with binaries.
Usage:
nxtvanitygen p s tAll parameters are optional. If no thread count is specified, tool will use all available CPU resources.
Examples:
1. Search for accounts starting with "100" and ending with "001" using 7 threads
nxtvanitygen p100 s001 t7
[INFO] Starting search with 7 threads
[INFO] Searching for account with prefix "100"
[INFO] Searching for account with suffix "001"
[20] 10097471757607329001 : EtYAigzyvucocenbrl4TgrQnZQd
[20] 10003885613434887001 : Hap4Z3hiSUXmwcb71oaX4SA6lne2. Search for accounts starting with "1337":
nxtvanitygen p1337
[INFO] Starting search with 8 threads
[INFO] Searching for account with prefix "1337"
[20] 13370655427675222059 : wyE3TKF1biEp8MQ9gF1yJEzvhr
[19] 1337321701037332552 : wyE3TKF1biEp8MQ9gF1yJEzvcu
[19] 1337265426018415968 : wyE3TKF1biEp8MQ9gF1yJEzvu6a3. Search for accounts ending with "1337":
nxtvanitygen s1337
[INFO] Starting search with 8 threads
[INFO] Searching for account with suffix "1337"
[20] 17555624245168541337 : MLrIa0inNTbg1xEsX1Y6Q5d00o
[19] 4357874968632581337 : d7cf3etnKoQyZj5jClnb0rCaBL
[19] 2400089921591981337 : YfXTBQL1BZzCGUVjb0Z0dauGsla
[19] 1973134486410101337 : MLrIa0inNTbg1xEsX1Y6Q5d0bya4. Just search for shortest possible account number:
nxtvanitygen
[INFO] Starting search with 8 threads
[20] 10338085328686616285 : OmMGRjBOMpShlfYMGFlBuPgja
[19] 4937369289318610888 : OmMGRjBOMpShlfYMGFlBuPgjd
[18] 629863575730409614 : OmMGRjBOMpShlfYMGFlBuPgjj
[18] 468107626643704710 : rctCFsNJU5WlLcdzoDXdhOd4b
[18] 220355335410294776 : OmMGRjBOMpShlfYMGFlBuPgjL
[17] 37716758511259142 : rctCFsNJU5WlLcdzoDXdhOd4P
[17] 31036511679475309 : OmMGRjBOMpShlfYMGFlBuPgjUb
[17] 30528851690106364 : OmMGRjBOMpShlfYMGFlBuPgjld
[17] 23063671801022467 : OLvwAaS8r244yFUCCjVkPzppXd
[17] 16132847436026631 : Kuj2No73oIIyqQ1sSZwXkmAmge
[17] 15844488120866410 : aycQzKqv8VwDly9bAnvJIrwcNf
[17] 14905054651945515 : rctCFsNJU5WlLcdzoDXdhOd4Nj
[17] 12782313021349671 : aycQzKqv8VwDly9bAnvJIrwcvl
[16] 8408041613508761 : aycQzKqv8VwDly9bAnvJIrwcJn
[16] 4055260369096446 : aycQzKqv8VwDly9bAnvJIrwcWt
[16] 2291473488286971 : OmMGRjBOMpShlfYMGFlBuPgjZz
[16] 1547187421785168 : aycQzKqv8VwDly9bAnvJIrwcyz
[15] 550469753637579 : rctCFsNJU5WlLcdzoDXdhOd4xR
[15] 412692226299035 : OLvwAaS8r244yFUCCjVkPzppXQb
[15] 190944096726430 : SedqAaKiWOme016JBddYCObdkNd
[13] 2511821714948 : 9MLNId7oWfs2aYcysRVibYKy99eFew words on security: tool generates random passwords. They are constructed by combining 24-char random (per-thread) prefix and sequential suffix. Tool uses OpenSSL's RNG to generate that random prefix.
Also, it should go without saying but:
PLEASE DON'T USE ANY OF THE PASSWORDS ABOVE AS IT'S NOT SAFE BECAUSE THEY ARE PUBLIC.
You can grab latest binaries (Windows only) here:
https://mega.co.nz/#!sZ8j3CTL!O20atwe7U058_BJORo-3jzKn1LpsWmaVAs_xgmj4tBI (use 64-bit version if you're on 64-bit OS)
Source code (and VS 2013 project; you'll have to take care of OpenSSL headers and libs yourself):
https://mega.co.nz/#!5E1wnCDI!Z062LkiZK9xJjpMKevNRjnvgfThr4d_eXbBS1gtQwnkIf you find the tool useful and/or fun please consider sending few tokens of appreciation to account number 86533079761. Thanks