I am interested to know the nature of the bot wars.
How is it possible the war?
Are the Kangaroo and BSGS tools sending the private key findings to the developers?
a strange question from someone who develops a tool for brute-forcing the Bitcoin puzzle and, according to
his own description, generates pubkeys to check against hash160. If I look at the rest of your
repositories, you have several Bitcoin construction sites and therefore your question seems even stranger. You should know enough about priv/pubkeys one would think (
cscanpub ECDSA priv and pub key generator) apart from using tools to hide system information or modify data. For example, the
WMI spoofer which spoofs information which other applications read from the Windows Management Instrumentation (WMI) information in Windows systems, the
WMI static spoofer to bypass HWID detection methods used by intrusive software like anti-cheats, etc.,
USB emulation to emulate HID devices (e.g. mouse, keyboard, ...), the
inserter to replace strings in binaries,
AntiOS to disguise hardware identifiers and system fingerprints, etc. etc. etc.
I'm not accusing you of anything, but if I put one and one together and were suspicious by nature, you would be an extreme candidate for this.
No offense, but if you really want to collaborate with the community then learn to disclose source code. Otherwise no one will want to work with you, let alone trust you.