Bip39 Wallet. You'll then do a fundamental recovery that has a command just like the 1 underneath. (This command takes advantage of a sample wallet file bunlded with BTCRecover) It's also discouraged to generate words straight from thought and use a secure cryptographic functionality to do so. BIP-32 hierarchical deterministic https://get-social-now.com/story4551025/bip-39-https-linktr-ee-bip39-the-2-minute-rule-for-bip39-word-list