solflare_pwn - Solflare Vault Extractor & Decryptor
-
Title
: solflare_pwn
Author:
cyclone
URL:
https://github.com/cyclone-github/solflare_pwn
Description:
Toolset to recover, extract and decrypt Solflare crypto vaults/wallets.Solflare Vault Extractor & Decryptor
Read here for more info about the "xpass" vulnerability discovered by cyclone which allows Solflare wallets to be decrypted without the wallet password: https://forum.hashpwn.net/post/416
POC tools to recover, extract and decrypt Solflare Vaults
This toolset is proudly the first to announce support for Recovering Solflare Wallets
Do to many of my GitHub projects being copied and sold -- which is in violation of their GPL v2.0 License -- I will not be releasing the source code for this project (yet).
- Contact me at https://forum.hashpwn.net/user/cyclone if you need help recovering your Solflare wallet password or seed phrase.
Solflare Vault location for Chrome extensions:
- Linux:
/home/$USER/.config/google-chrome/Default/Local\ Extension\ Settings/bhhhlbepdkbapadjdnnojkbgioiodbic/
- Mac:
Library>Application Support>Google>Chrome>Default>Local Extension Settings>bhhhlbepdkbapadjdnnojkbgioiodbic
- Windows:
C:\Users\$USER\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic\
Extractor usage example on test vault: (plaintext is "cyclone")
./solflare_extractor.bin bhhhlbepdkbapadjdnnojkbgioiodbic/ ----------------------------------------------------- | Cyclone's Solflare Vault Hash Extractor | | Use Solflare Vault Decryptor to decrypt | | https://github.com/cyclone-github/solflare_pwn | ----------------------------------------------------- Encrypted Solflare Vault: $solflare$100000$a9ae805aef0936a0b48a77554601b948$b3b0fcbe4a36abfcdad97df8c5c3be4b633eaf4ee53d392f$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$d899e2192ab65116a19de312ed578d5d943ca5c46f68ba92be14807f931469688c67bb9e5812fdb3953599f13a0703e2ee9ba3849e358d74d91a6d61e0d0d454be17
Decryptor usage example:
----------------------------------------------- | Cyclone's Solflare Vault Decryptor | | https://github.com/cyclone-github/solflare_pwn | ----------------------------------------------- Vault file: hash.txt Valid Vaults: 1 CPU Threads: 16 Wordlist: wordlist.txt 2025/02/12 11:52:20 Working... Hash: $solflare$100000$a9ae805aef0936a0b48a77554601b948$b3b0fcbe4a36abfcdad97df8c5c3be4b633eaf4ee53d392f$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 Password: cyclone Seed Phrase: daring rose clump noble element fork differ inform gravity turtle oven iron 2025/02/12 11:52:35 Decrypted: 1/1 718.31 h/s 00h:00m:15s 2025/02/12 11:52:35 Finished
Decryptor exploit usage example:
----------------------------------------------- | Cyclone's Solflare Vault Decryptor | | https://github.com/cyclone-github/solflare_pwn | ----------------------------------------------- Vault file: hash.txt Valid Vaults: 1 CPU Threads: 16 Mode: xpass exploit 2025/02/12 11:44:37 Working... Hash: $solflare$100000$a9ae805aef0936a0b48a77554601b948$b3b0fcbe4a36abfcdad97df8c5c3be4b633eaf4ee53d392f$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$d899e2192ab65116a19de312ed578d5d943ca5c46f68ba92be14807f931469688c67bb9e5812fdb3953599f13a0703e2ee9ba3849e358d74d91a6d61e0d0d454be17 Password: No password needed, see https://forum.hashpwn.net/post/416 Seed Phrase: daring rose clump noble element fork differ inform gravity turtle oven iron 2025/02/12 11:44:37 Finished 2025/02/12 11:44:37 Decrypted: 1/1 62.09 h/s 00h:00m:00s
Decryptor supported options:
-w {wordlist} (omit -w to read from stdin) -h {solflare_wallet_hash} -o {output} (omit -o to write to stdout) -t {cpu threads} -s {print status every nth sec} -version (version info) -help (usage instructions) ./solflare_decryptor.bin -h {solflare_wallet_hash} -w {wordlist} -o {output} -t {cpu threads} -s {print status every nth sec} ./solflare_decryptor.bin -h solflare.txt -w wordlist.txt -o cracked.txt -t 16 -s 10 cat wordlist | ./solflare_decryptor.bin -h solflare.txt ./solflare_decryptor.bin -h solflare.txt -w wordlist.txt -o output.txt
-
Very interesting. Is the encryption algorithm the same as the old phantom wallet?
-
Very interesting. Is the encryption algorithm the same as the old phantom wallet?
-
Proud to have worked with @cyclone on this, we will not be revealing exactly how it works for now.
-
Proud to have worked with @cyclone on this, we will not be revealing exactly how it works for now.
Thanks, @rickyc2024, for bringing this wallet to my attention. It was a lot of fun working through it, and congrats for also figuring this one out and writing your own tooling for extracting / decrypting the wallet.
There's also a hidden "easter egg" that has been reported to Solflare that both rickyc2024 and I independently discovered.
Concerning the
solflare_pwn
toolset. To clarify, it is solely my work, built from my own work with reverse engineering, cryptography and software development. There are zero lines of code in the toolset that came, or were influenced by, any other source. -
hi! @cyclone WIll you gonna upload solflare solution? https://github.com/cyclone-github/solflare_pwn
-
hi! @cyclone WIll you gonna upload solflare solution? https://github.com/cyclone-github/solflare_pwn
@secretscribe1
solflare_extractor
tool has been released on GitHub. DM me if you need help recovering a Solflare wallet.
https://github.com/cyclone-github/solflare_pwn/releases -
New GitHub Release
:
Solflare Wallet Extractor and Decryptor compiled binaries have both been posted on GitHub.Note, I am not publicly releasing the xpass exploit logic with the decryptor. If you have forgotten your Solflare password and cannot recover it with the decryptor on GitHub, send me a DM.
Solflare Vault Extractor v0.1.0
:
Solflare Vault Decryptor v0.1.1
:
https://github.com/cyclone-github/solflare_pwn/releases -
New GitHub Release
:
Solflare Wallet Extractor and Decryptor compiled binaries have both been posted on GitHub.Note, I am not publicly releasing the xpass exploit logic with the decryptor. If you have forgotten your Solflare password and cannot recover it with the decryptor on GitHub, send me a DM.
Solflare Vault Extractor v0.1.0
:
Solflare Vault Decryptor v0.1.1
:
https://github.com/cyclone-github/solflare_pwn/releases -
@cyclone Hi cyclone, could you help me in decrypting the wallet, I don't understand how to open the code from github
@pirozhok You'll need to run the extractor and decryptor from terminal since they are CLI tools. This is similar to how you would run most hash cracking tools such as hashcat, mdxfind, john, etc.
There are usage examples on the OP above and GitHub readme. Before tackling your own Solflare wallet, try recovering the password and seed phrase from the test hash.
https://forum.hashpwn.net/post/404