Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Tools
  3. Hash Cracking
  4. phantom_pwn - Phantom Vault Extractor & Decryptor

phantom_pwn - Phantom Vault Extractor & Decryptor

Scheduled Pinned Locked Moved Hash Cracking
24 Posts 9 Posters 1.3k Views 9 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Online
    cycloneC Online
    cyclone
    Admin Trusted
    wrote on last edited by
    #3

    Make sure you read through all the information in the GitHub repo as it gives specific details on how to compile and run the toolset. The .go file is the source code which only needs compiled and run.
    https://github.com/cyclone-github/phantom_pwn

    Double check you have the wallet location in your command.
    ex:

    phantom_extractor.exe "path_to_your_wallet\bfnaelmomeimhlpmgjnjophhpkkoljpa"
    

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    0
    • F Offline
      F Offline
      freeordead
      wrote on last edited by
      #4

      thanks for this, i've managed to get the extractor compiled but based on the readme/github writeup i'm not sure what my next steps would be, it looks like an .exe file was created in the phantom_pwn directory. here's what i see right now: https://imgur.com/a/51OXTuw

      i might be in over my head on this, hate to be a bother but any direction would mean the world, i really have tried to decipher the writeups and i'm just not sure what commands i'm looking for.

      1 Reply Last reply
      0
      • cycloneC Online
        cycloneC Online
        cyclone
        Admin Trusted
        wrote on last edited by
        #5

        DM sent.

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • cycloneC Online
          cycloneC Online
          cyclone
          Admin Trusted
          wrote on last edited by cyclone
          #6

          Fixed issue with Windows new line control characters, plus added several performance optimizations.
          Source code:
          https://github.com/cyclone-github/phantom_pwn/tree/main/phantom_decryptor
          Release:
          https://github.com/cyclone-github/phantom_pwn/releases/tag/v0.1.5
          Issue Resolved:
          https://github.com/cyclone-github/phantom_pwn/issues/6

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          👍
          2
          • F Offline
            F Offline
            freeordead
            wrote on last edited by
            #7

            shoutout to @cyclone !! he spent a good chunk of time and helped me recover the seed phrase for a wallet i've been trying to recover over the past year - true professional, much love g

            1 Reply Last reply
            🍻
            2
            • B Offline
              B Offline
              billyjon123
              wrote on last edited by
              #8

              Hi @cyclone its billy from before can you help me recover seed phrase for a phantom wallet?

              cycloneC 1 Reply Last reply
              0
              • B billyjon123

                Hi @cyclone its billy from before can you help me recover seed phrase for a phantom wallet?

                cycloneC Online
                cycloneC Online
                cyclone
                Admin Trusted
                wrote on last edited by
                #9

                @billyjon123 I recognize your username from GitHub. DM sent.

                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                3x RTX 4090

                1 Reply Last reply
                0
                • C Offline
                  C Offline
                  cryptuhstonks
                  wrote on last edited by
                  #10

                  Hi Cyclone,

                  Thanks for creating this tool. It looks like I've almost got it but not quite. I get "Error opening Vault" but It did spit out a hash and I manged to get the hash into a txt document. The only problem is it can't decrypt. I'm assuming there is something I'm doing wrong or the vault I'm trying to access is corrupted. I also tried with your test hash and wasn't able to decrypt that either. I'm on macos. Sequoia. Once again thank you for your time, any help would be appreciated.

                  cycloneC 1 Reply Last reply
                  0
                  • C cryptuhstonks

                    Hi Cyclone,

                    Thanks for creating this tool. It looks like I've almost got it but not quite. I get "Error opening Vault" but It did spit out a hash and I manged to get the hash into a txt document. The only problem is it can't decrypt. I'm assuming there is something I'm doing wrong or the vault I'm trying to access is corrupted. I also tried with your test hash and wasn't able to decrypt that either. I'm on macos. Sequoia. Once again thank you for your time, any help would be appreciated.

                    cycloneC Online
                    cycloneC Online
                    cyclone
                    Admin Trusted
                    wrote on last edited by
                    #11

                    @cryptuhstonks Read through this GitHub issue and DM me if you run into any snags.
                    https://github.com/cyclone-github/phantom_pwn/issues/14#issuecomment-2613081472

                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                    3x RTX 4090

                    1 Reply Last reply
                    0
                    • cycloneC Online
                      cycloneC Online
                      cyclone
                      Admin Trusted
                      wrote on last edited by
                      #12

                      Updated source code of phantom_extractor v0.3.3-2025-02-04 has been uploaded which now supports hashcat modes 30010, 26650 and 26651. While those hashcat kernels are not publicly released, the tool can be used to extract Phantom wallets for them.

                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                      3x RTX 4090

                      JohnJ 1 Reply Last reply
                      👍
                      2
                      • cycloneC cyclone

                        Updated source code of phantom_extractor v0.3.3-2025-02-04 has been uploaded which now supports hashcat modes 30010, 26650 and 26651. While those hashcat kernels are not publicly released, the tool can be used to extract Phantom wallets for them.

                        JohnJ Offline
                        JohnJ Offline
                        John
                        Contributor
                        wrote on last edited by
                        #13

                        @cyclone said in phantom_pwn - Phantom Vault Extractor & Decryptor:

                        30010, 26650 and 26651

                        Without these cores the program won't work? I understand it works in conjunction with hashcat?

                        cycloneC 1 Reply Last reply
                        0
                        • JohnJ John

                          @cyclone said in phantom_pwn - Phantom Vault Extractor & Decryptor:

                          30010, 26650 and 26651

                          Without these cores the program won't work? I understand it works in conjunction with hashcat?

                          cycloneC Online
                          cycloneC Online
                          cyclone
                          Admin Trusted
                          wrote on last edited by
                          #14

                          @John phantom_extractor extracts the Phantom wallet vault into compatible hashes for either phantom_decryptor or hashcat modes 30010, 26650, 26651. Keep in mind, I do not own those hashcat kernels, so if you need them, you'll have to purchase them directly from the developers.

                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                          3x RTX 4090

                          1 Reply Last reply
                          👍
                          0
                          • A Offline
                            A Offline
                            ar7s
                            wrote on last edited by
                            #15

                            Hey my ffriend! thanks for that tool, you are awesome. Can you please help me a little bit? i have done almost everything but im not sure if i need to know my password in order to unlock the wallet or to recover the seed phrse.

                            thanks in advance

                            1 Reply Last reply
                            0
                            • A Offline
                              A Offline
                              ar7s
                              wrote on last edited by
                              #16

                              hey there, where can i dm you

                              cycloneC 1 Reply Last reply
                              0
                              • A ar7s

                                hey there, where can i dm you

                                cycloneC Online
                                cycloneC Online
                                cyclone
                                Admin Trusted
                                wrote on last edited by
                                #17

                                @ar7s DM sent.

                                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                3x RTX 4090

                                1 Reply Last reply
                                0
                                • R Offline
                                  R Offline
                                  rickyc2024
                                  Banned
                                  wrote on last edited by
                                  #18

                                  @cyclone I wanted to speak with you about your vault decryptors. I am currently working on a vault decryptor for solflare wallet but I have had some issues with decrypting the vault data with secretbox as it dosen't seem to be encrypted with the wallet password. Can we speak in dms?

                                  cycloneC 1 Reply Last reply
                                  0
                                  • R Offline
                                    R Offline
                                    rickyc2024
                                    Banned
                                    wrote on last edited by
                                    #19

                                    I also noticed that the structure of solflare vault data is almost identical to the structure of phantom but it doesn't seem to be using the wallet password.

                                    1 Reply Last reply
                                    0
                                    • R rickyc2024

                                      @cyclone I wanted to speak with you about your vault decryptors. I am currently working on a vault decryptor for solflare wallet but I have had some issues with decrypting the vault data with secretbox as it dosen't seem to be encrypted with the wallet password. Can we speak in dms?

                                      cycloneC Online
                                      cycloneC Online
                                      cyclone
                                      Admin Trusted
                                      wrote on last edited by
                                      #20

                                      @rickyc2024 DM sent.

                                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                      3x RTX 4090

                                      1 Reply Last reply
                                      0
                                      • S Offline
                                        S Offline
                                        shinexyz
                                        wrote on last edited by
                                        #21

                                        Hi! thank you so much for this. I am super beginner, only started code with the help of claude recently...

                                        I am trying to crack my own phantom wallet that I forgot the password (didn't write down the seed phrases... ). I have some clue on certain words that the password may contain (not sure either, but trying)

                                        do I need both decryptor and extractor or just decryptor?

                                        I managed to install GO and created exe file for windows (go build?) but when I tried with Key.txt (extracted from wallet), it didn't work..
                                        (I tested on the phantom wallet which I know the password of, and used a random word list with the actual pass word inside) Any idea why this would be the case? Thanks so much!

                                        cycloneC 1 Reply Last reply
                                        0
                                        • S shinexyz

                                          Hi! thank you so much for this. I am super beginner, only started code with the help of claude recently...

                                          I am trying to crack my own phantom wallet that I forgot the password (didn't write down the seed phrases... ). I have some clue on certain words that the password may contain (not sure either, but trying)

                                          do I need both decryptor and extractor or just decryptor?

                                          I managed to install GO and created exe file for windows (go build?) but when I tried with Key.txt (extracted from wallet), it didn't work..
                                          (I tested on the phantom wallet which I know the password of, and used a random word list with the actual pass word inside) Any idea why this would be the case? Thanks so much!

                                          cycloneC Online
                                          cycloneC Online
                                          cyclone
                                          Admin Trusted
                                          wrote on last edited by
                                          #22

                                          @shinexyz You'll need to first run phantom_extractor to extract the vault hash, then run phantom_decryptor with that hash and wordlist containing password candidates. Try cracking the example hash first to verify you've got everything figured out and working.

                                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                          3x RTX 4090

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          Who's Online [Full List]

                                          10 users active right now (7 members and 3 guests).
                                          cyclone, hashpwn-bot, freeroute, petrovivo1234, foobar, tychotithonus

                                          Board Statistics

                                          Our members have made a total of 3.4k posts in 150 topics.
                                          We currently have 256 members registered.
                                          Please welcome our newest member, thatux.
                                          The most users online at one time was 49 on Thursday, December 26, 2024.

                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent