First, you'll need to compile the source code as specified in the GitHub README under Compile from source:
https://github.com/cyclone-github/phantom_pwn/blob/main/README.md
For your reference, I've included this below:
Compile from source:
This assumes you have Go and Git installed
git clone https://github.com/cyclone-github/phantom_pwn.git
phantom_extractor
cd phantom_pwn/phantom_extractor
go mod init phantom_extractor
go mod tidy
go build -ldflags="-s -w" .
phantom_decryptor
cd phantom_pwn/phantom_decryptor
go mod init phantom_decryptor
go mod tidy
go build -ldflags="-s -w" .
Compile from source code how-to:
https://github.com/cyclone-github/phantom_pwn/blob/main/README.md
Note: all of my crypto wallet *_pwn toolsets are similar in how to compile the binaries, extract crypto wallet hashes and decrypting / cracking them.
Once you have the extractor and decryptor compiled, you'll need to run the extractor by pointing it at the directory with your wallet vault:
phantom_extractor path/to/your/wallet
Once the wallet hash has been extracted, save this to a file such as phantom.txt, then run phantom_decryptor with your phantom.txt and wordlist. This is similar to how you would run hashcat, jtr or mdxfind, but mind the specific -h {hash} and -w {wordlist} CLI commands below:
phantom_decryptor -h phantom.txt -w wordlist.txt
Running these toolsets requires a prior knowledge of CLI tools. If you're still stumped, send me a DM and I'll walk you through the process.