Everything you need to
recover your wallet.
Complete reference for all 10 recovery algorithms — from a single missing word to exhaustive seed × passphrase combination testing. Pick your scenario, follow the guide.
🚀 Getting Started
2 pagesAbout wrecover
The story behind the software, author profile, technology stack, design philosophy, and responsible-use principles.
License Agreement (EULA)
End User License Agreement. Defines rights for Free and Pro versions — what you may and may not do with the software and its source code.
🌱 Seed Phrase Recovery
2 modesModel File Recovery
You know some words but not their exact positions. Use a model file with constraints (@required, @#N fixed, word groups) to systematically test valid combinations.
Mnemonic Brute Force
You know most of your seed phrase but are missing 1–5 words. Mark each unknown position with x inline (e.g. abandon x able …). wrecover tries all 2,048 BIP-39 words at each unknown slot. GPU acceleration is available in the Free version for up to 3 missing words; 4+ requires the Pro version.
🔒 Passphrase Recovery
3 modesPassphrase Full Brute Force
You know the seed phrase but have completely forgotten the passphrase. Systematically tries every combination of characters up to a given length. GPU is essential.
Passphrase Mask
You remember the structure of your passphrase. Use typed wildcards for unknown positions: ?l=lowercase, ?u=uppercase, ?d=digit, ?s=special, ?a=all. Example: MyPass?d?d?d?d tests all 4-digit endings.
Passphrase Substitution
You used leet-speak or character substitutions (a→@, o→0, s→$…). Provide base words in a dictionary file; wrecover generates and tests all variants automatically.
📂 File-Based & Combined Modes
5 modesModel + Passphrase File
Combines Mode 0 (Model file constraints on the seed) with a list of passphrase candidates from a file. Tests all seed combinations against all passphrases.
Brute Seed + Passphrase File
You are missing 1–4 seed words (marked with x) AND have a list of passphrase candidates. wrecover brute-forces every valid seed combination and tests each against all passphrases in the list simultaneously.
Seed from File
You have multiple complete seed phrase candidates (from backups, permutations, etc.) and no passphrase. Tests each seed directly against the target address.
Passphrase File
You know your seed phrase completely and have a list of passphrase candidates to test. Each passphrase in the file is tested against the known seed and target address. CPU only.
Seed + Password File
The most exhaustive mode: tests every seed phrase from a file against every passphrase from another file. Use when both the seed and the passphrase are uncertain.
No documentation pages match your search.
Try different keywords.
🧭 Which mode should I use?
| My situation | Seed phrase | Passphrase | Recommended mode |
|---|---|---|---|
| I know some words but not their positions or some are unknown | Partial — constraints known | Known or none | Mode 0 — Model File |
| I know 11 of 12 words (or 21 of 24, etc.) | 1–5 words missing (x) |
Known or none | Mode 1 — Mnemonic Brute |
| I know my seed phrase but forgot the passphrase entirely | Complete ✓ | Fully forgotten — short | Mode 2 — Passphrase Full |
| I remember part of my passphrase (e.g. starts with "My" and ends with digits) | Complete ✓ | Partial pattern known | Mode 3 — Passphrase Mask |
| I used a dictionary word as passphrase, possibly with leet-speak | Complete ✓ | Base word known, variants possible | Mode 4 — Substitution |
| I have partial seed knowledge AND a list of possible passphrases | Partial — model file | List of candidates | Mode 5 — Model + PP File |
| I have missing seed words AND a list of possible passphrases | 1–4 words missing (x) |
List of candidates | Mode 6 — Brute Seed + PP File |
| I know my seed phrase and have a list of possible passphrases to try | Complete ✓ | List of candidates | Mode 8 — Passphrase File |
| I have multiple complete seed backups to test and no passphrase | Multiple candidates (file) | None / empty / complete | Mode 7 — Seed from File |
| I have multiple possible seeds AND multiple possible passphrases | Multiple candidates (file) | Multiple candidates (file) | Mode 9 — Seed + Pass File |
⚡ Quick Command Reference
| Option | Description | Example | Modes |
|---|---|---|---|
-m N |
Recovery mode (0–9) | -m 1 |
All |
-l N |
Mnemonic length (12, 18, 24) | -l 12 |
0, 5 |
-addr "..." |
Target wallet address | -addr "1A1zP1..." |
All |
-wlang en |
BIP-39 wordlist language | -wlang en |
All |
-ms "..." |
Partial mnemonic with x placeholders for unknown words |
-ms "word1 x word3 ..." |
1, 6 |
-mf "..." |
Complete known seed phrase (all words known) | -mf "word1 word2 ..." |
2, 3, 4, 8 |
-cf "file" |
Model file path | -cf "model.txt" |
0, 5 |
-sf "file" |
Seed phrase file, one complete phrase per line (.txt new, .bin resume) | -sf "seeds.txt" |
7, 9 |
-pps "file" |
Passphrase / dictionary file, one entry per line (.txt new, .bin resume) | -pps "passphrases.txt" |
4, 5, 6, 8, 9 |
-mask "..." |
Passphrase mask — literal chars + typed wildcards (?l ?u ?d ?s ?a ?b) |
-mask "pass?d?d?d" |
3 |
-lmin N |
Minimum passphrase length to brute-force | -lmin 1 |
2 |
-lmax N |
Maximum passphrase length to brute-force | -lmax 6 |
2 |
-pp "..." |
Fixed passphrase (25th word) | -pp "mysecret" |
0, 1, 8 |
-ws -wf "file" -wp "password" |
New search — save progress to work file (.wrec) | -ws -wf "job.wrec" -wp "01234" |
All |
-save-only |
Create work file only, do not start recovery | -save-only -wf "job.wrec" |
All |
-wi -wf "file" -wp "password" |
Resume from work file (.wrec) | -wi -wf "job.wrec" -wp "01234" |
All |
-startp N |
Start at combination offset N — distributed recovery (Pro only) | -startp 5000000 |
0–6 (Pro) |
-endp N |
Stop at combination offset N — distributed recovery (Pro only) | -endp 10000000 |
0–6 (Pro) |
-t N |
CPU thread count (max 10 Free) | -t 8 |
All |
-gpu |
Enable GPU acceleration — Free: Mode 1 only, max 3 missing words; Pro: all compatible modes, unlimited | -gpu |
0–6 (Pro); 1 (Free ≤3) |
-grid N |
GPU grid size (default: 256) | -grid 256 |
0–6 (Pro) |
-gblock N |
GPU threads per block (default: 256, max: 256) | -gblock 256 |
0–6 (Pro) |
-dpath "..." |
Custom BIP-44 derivation path | -dpath "m/44'/0'/0'/0/0" |
All |
📊 Mode Compatibility Matrix
| Mode | Free Version | GPU | Work-Save | Distributed | Model File | Seed File | PP File | Mask |
|---|---|---|---|---|---|---|---|---|
| Mode 0 — Model File | ✓ | ✓ | ✓ | ✓ | ✓ | — | — | — |
| Mode 1 — Mnemonic Brute | ✓ | Free ≤3 / Pro ∞ | ✓ | ✓ | — | — | — | — |
| Mode 2 — Passphrase Full | ✓ | ✓ | ✓ | ✓ | — | — | — | — |
| Mode 3 — Passphrase Mask | ✓ | ✓ | ✓ | ✓ | — | — | — | ✓ |
| Mode 4 — Substitution | ✓ | ✓ | ✓ | ✓ | — | — | ✓ | — |
| Mode 5 — Model + PP File | ✓ | ✓ | ✓ | ✓ | ✓ | — | ✓ | — |
| Mode 6 — Brute Seed + PP File | ✓ | ✓ | ✓ | ✓ | — | — | ✓ | — |
| Mode 7 — Seed from File | ✓ | — | ✓ | — | — | ✓ | — | — |
| Mode 8 — Passphrase File | ✓ | — | ✓ | — | — | — | ✓ | — |
| Mode 9 — Seed + Pass File | ✓ | — | ✓ | — | — | ✓ | ✓ | — |