Skip to content
  • Hashes.com Escrow Feed

    Pinned Locked Moved Resources
    10k
    1 Votes
    10k Posts
    174k Views
    hashpwn-botH
    Escrow ID# 85965 • Algorithm: Domain Cached Credentials 2 (DCC2), MS Cache 2, -m 2100 • Total hashes: 1 • Price per hash: $9.9925 • Escrow URL: https://hashes.com/en/escrow/item/?id=85965 • Download hashes: 85965_2100.zip
  • Fast hash validation tool, hashpipe

    Hash Cracking
    1
    1 Votes
    1 Posts
    4 Views
    No one has replied
  • solflare_pwn - Solflare Vault Extractor & Decryptor

    Hash Cracking
    14
    2 Votes
    14 Posts
    2k Views
    cycloneC
    solflare_pwn v0.3.1 released includes xpass exploit, details here: https://forum.hashpwn.net/post/11116 https://github.com/cyclone-github/solflare_pwn/releases/tag/v0.3.1
  • Infosec News

    General Discussion
    115
    1
    1 Votes
    115 Posts
    31k Views
    cycloneC
    Update: Details of the Solflare “xpass” Exploit March 13, 2026 [image: 1773412854934-c25dc614-d139-4de7-9c3b-da142cb773bb-image.png] In Feb 2025, I reported an exploit vulnerability in the Solflare Chrome wallet which allowed the wallet vault (solflaredata) to be decrypted without the user's password. Original post from Feb 2025: https://forum.hashpwn.net/post/416 Turns out, this was a backdoor, not a bug. Today, I am releasing the full details of the xpass exploit, aka the "backdoor master key". https://forum.hashpwn.net/post/11116
  • 1 Votes
    18 Posts
    2k Views
    cycloneC
    Update: Details of the Solflare “xpass” Exploit March 13, 2026 Over the past year I have received many requests asking when I would release the full details of the Solflare xpass exploit. Today, I am publishing those details. This post serves as an update to my original disclosure in Feb 2025 regarding a purposeful backdoor master key I discovered in the Solflare Chrome wallet extension that allows a wallet vault to be decrypted without requiring the user's wallet password. At the time of the original report I privately disclosed this to Solflare and delayed public publication to give Solflare time to address the exploit. The Core Issue Solflare stores two critical values inside the extension's LevelDB storage: solflaredata – encrypted wallet vault containing the seed phrase <-- this encrypted string contains the wallet seed phrase solflarexpass – a key used to decrypt the vault <-- the "backdoor master key" Because the decryption key is stored locally alongside the encrypted vault, the user's wallet password is not required to decrypt the vault and gain access to the wallet's seed phrase. All that is required to decrypt the wallet and gain access to the seed phrase is access to the Chrome extension storage and extraction of the solflarexpass key -- something very easy for a malicious actor or stealer malware to do. Once the vault is extracted with the key, the seed phrase can be recovered. No password cracking required. Example Storage Layout Inside the Chrome Solflare extension storage database the relevant entries appear similar to: solflaredata: { "data":{ "digest":"sha256", "encoding":"base64", "encrypted64":"..." } } solflarexpass: "<stored key>" Using the key stored in solflarexpass, the encrypted vault (solflaredata) can be decrypted. A screenshot of the original report is attached below. [image: 1773412854934-c25dc614-d139-4de7-9c3b-da142cb773bb-image.png]
  • 0 Votes
    4 Posts
    30 Views
    S
    @cyclone Trying to extract the vault gives me checksum mistakes with Chrome
  • Wordlists

    Wordlists wordlist
    27
    4 Votes
    27 Posts
    6k Views
    A1131A
    Some of the above wordlists are now available via mirrors thanks to weakpass.com, so if you encounter download limits from Mega you can use these links instead Goodies_v1 Goodies_v2 Archive Archive.founds Triodante A1131 top_passwords
  • rulest - GPU Rules Extractor

    Scripts
    4
    0 Votes
    4 Posts
    704 Views
    A1131A
    https://gist.githubusercontent.com/A113L/64184c75477c32a448779836087ad4d8/raw/5abfc5c874b60aa9f8cf4bf1fc1be7a19388be25/gistfile1.txt
  • guarda_pwn - Guarda Wallet Vault Decryptor

    Hash Cracking
    1
    0 Votes
    1 Posts
    184 Views
    No one has replied
  • 0 Votes
    3 Posts
    142 Views
    cycloneC
    trustwallet_pwn toolkit has been released which supports extracting and decrypting Chrome based Trust Wallet browser extensions for password and seed phrase recovery. https://forum.hashpwn.net/post/10795
  • 0 Votes
    8 Posts
    2k Views
    cycloneC
    trustwallet_pwn toolkit has been released which supports extracting and decrypting Chrome based Trust Wallet browser extensions for password and seed phrase recovery. https://forum.hashpwn.net/post/10795
  • 0 Votes
    1 Posts
    214 Views
    No one has replied
  • 0 Votes
    7 Posts
    331 Views
    N
    I confirm. None of the ready-made extractor or decryptor programs worked with the Zen browser. This person sorted out the situation for free, adapted the programs for my browser, and restored my SRP. For that, I'm incredibly grateful.
  • Dough Wallet Recovery Tool

    Hash Cracking
    1
    1 Votes
    1 Posts
    204 Views
    No one has replied
  • 0 Votes
    2 Posts
    469 Views
    E
    "7C757524E50AFF4DAF41A8A773E77D36E18CE9E5 Mysql
  • md5 hash

    Standard: MD5, SHA1, SHA256, etc.
    4
    0 Votes
    4 Posts
    512 Views
    174region1741
    Found 11 Left 182 F.txt left.txt
  • Hashchef

    Hash Cracking
    4
    1
    3 Votes
    4 Posts
    554 Views
    PlumP
    @test123456 said in Hashchef: Are there any tutorials available, such as video tutorials? No. There is plenty of documentation on the git and is fairly straight forward to use. If you have any specific questions I am more than happy to answer them.
  • md5 help

    Standard: MD5, SHA1, SHA256, etc.
    3
    0 Votes
    3 Posts
    467 Views
    D
    dump not have salt i check all bd planetarium-laupheim.de
  • hi md5

    Standard: MD5, SHA1, SHA256, etc.
    3
    0 Votes
    3 Posts
    467 Views
    cycloneC
    Previous left list appears to be a found list, so using original 123.txt from OP as left list. 11675_found.txt 743_left.txt 12418 total
  • Hashcat GUI with hashes.com escrow integration

    HashcatGUI
    18
    4
    0 Votes
    18 Posts
    2k Views
    T
    When will Linux versions be released?

Who's Online [Full List]

13 users active right now (4 members and 9 guests).
hashpwn-bot, cyclone, Waffle, danail

Board Statistics

Our members have made a total of 11.0k posts in 179 topics.
We currently have 380 members registered.
Please welcome our newest member, Waffle.
The most users online at one time was 49 on Thursday, December 26, 2024.