How to make a keychain with t-shirt yarn recycling a T-shirt

I do not know if it happens to you, but there is no way to find the keychain in the bag, I start to look from one side, from the other, and especially if I am in a hurry. The other day fixing a shirt ... I thought of making a keychain with some volume so that he would notice it when he looked around and took it out the first time. So today I come with this idea to see if it works for you, it has been great for me. We'll see how to make a keychain recycling a t-shirt.

Makings:

  • T-shirt to recycle.
  • Accounts.
  • Button.
  • Thread and needle.
  • Scissors.
  • Washer.

Processing:

  • For this craft you can take advantage of a piece of shirt that you are not going to use. But if you have yarn at home, you don't need to follow these two steps.
  • Cut strips of about two centimeters for the length you want, in my case it is thirty centimeters.

  • Take the two ends of each strip with your hands and stretch until it rolls up and forms the fabric.
  • Tie three strips to the ring and make a braid.

  • Enter below some five strips for the ring and place in the central point, as seen in the image.
  • Roll up with another strip of fabric right next to the ring and takes a few turns. To hold it, spend a few stitches with the thread and take the opportunity to finish off by placing a button.

  • Now enter the beads for some of the t-shirt yarn strips and fasten by making a knot at the end.
  • Tie knots in the remaining strips at different heights and cut with the scissors what is left of the cloth.

Place the key and you will have the keychain ready. You can also use it as a decoration in your bag or backpack. A nice accessory for the beginning of the year, we are already working on it.


A comment, leave yours

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Pink said

    A really nice and practical keychain. I love your ideas. Thanks