Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Tools
  3. Hash Cracking
  4. phantom_pwn - Phantom Vault Extractor & Decryptor

phantom_pwn - Phantom Vault Extractor & Decryptor

Scheduled Pinned Locked Moved Hash Cracking
24 Posts 9 Posters 1.3k Views 9 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • B Offline
    B Offline
    billyjon123
    wrote on last edited by
    #8

    Hi @cyclone its billy from before can you help me recover seed phrase for a phantom wallet?

    cycloneC 1 Reply Last reply
    0
    • B billyjon123

      Hi @cyclone its billy from before can you help me recover seed phrase for a phantom wallet?

      cycloneC Online
      cycloneC Online
      cyclone
      Admin Trusted
      wrote on last edited by
      #9

      @billyjon123 I recognize your username from GitHub. DM sent.

      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
      3x RTX 4090

      1 Reply Last reply
      0
      • C Offline
        C Offline
        cryptuhstonks
        wrote on last edited by
        #10

        Hi Cyclone,

        Thanks for creating this tool. It looks like I've almost got it but not quite. I get "Error opening Vault" but It did spit out a hash and I manged to get the hash into a txt document. The only problem is it can't decrypt. I'm assuming there is something I'm doing wrong or the vault I'm trying to access is corrupted. I also tried with your test hash and wasn't able to decrypt that either. I'm on macos. Sequoia. Once again thank you for your time, any help would be appreciated.

        cycloneC 1 Reply Last reply
        0
        • C cryptuhstonks

          Hi Cyclone,

          Thanks for creating this tool. It looks like I've almost got it but not quite. I get "Error opening Vault" but It did spit out a hash and I manged to get the hash into a txt document. The only problem is it can't decrypt. I'm assuming there is something I'm doing wrong or the vault I'm trying to access is corrupted. I also tried with your test hash and wasn't able to decrypt that either. I'm on macos. Sequoia. Once again thank you for your time, any help would be appreciated.

          cycloneC Online
          cycloneC Online
          cyclone
          Admin Trusted
          wrote on last edited by
          #11

          @cryptuhstonks Read through this GitHub issue and DM me if you run into any snags.
          https://github.com/cyclone-github/phantom_pwn/issues/14#issuecomment-2613081472

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          0
          • cycloneC Online
            cycloneC Online
            cyclone
            Admin Trusted
            wrote on last edited by
            #12

            Updated source code of phantom_extractor v0.3.3-2025-02-04 has been uploaded which now supports hashcat modes 30010, 26650 and 26651. While those hashcat kernels are not publicly released, the tool can be used to extract Phantom wallets for them.

            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
            3x RTX 4090

            JohnJ 1 Reply Last reply
            👍
            2
            • cycloneC cyclone

              Updated source code of phantom_extractor v0.3.3-2025-02-04 has been uploaded which now supports hashcat modes 30010, 26650 and 26651. While those hashcat kernels are not publicly released, the tool can be used to extract Phantom wallets for them.

              JohnJ Offline
              JohnJ Offline
              John
              Contributor
              wrote on last edited by
              #13

              @cyclone said in phantom_pwn - Phantom Vault Extractor & Decryptor:

              30010, 26650 and 26651

              Without these cores the program won't work? I understand it works in conjunction with hashcat?

              cycloneC 1 Reply Last reply
              0
              • JohnJ John

                @cyclone said in phantom_pwn - Phantom Vault Extractor & Decryptor:

                30010, 26650 and 26651

                Without these cores the program won't work? I understand it works in conjunction with hashcat?

                cycloneC Online
                cycloneC Online
                cyclone
                Admin Trusted
                wrote on last edited by
                #14

                @John phantom_extractor extracts the Phantom wallet vault into compatible hashes for either phantom_decryptor or hashcat modes 30010, 26650, 26651. Keep in mind, I do not own those hashcat kernels, so if you need them, you'll have to purchase them directly from the developers.

                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                3x RTX 4090

                1 Reply Last reply
                👍
                0
                • A Offline
                  A Offline
                  ar7s
                  wrote on last edited by
                  #15

                  Hey my ffriend! thanks for that tool, you are awesome. Can you please help me a little bit? i have done almost everything but im not sure if i need to know my password in order to unlock the wallet or to recover the seed phrse.

                  thanks in advance

                  1 Reply Last reply
                  0
                  • A Offline
                    A Offline
                    ar7s
                    wrote on last edited by
                    #16

                    hey there, where can i dm you

                    cycloneC 1 Reply Last reply
                    0
                    • A ar7s

                      hey there, where can i dm you

                      cycloneC Online
                      cycloneC Online
                      cyclone
                      Admin Trusted
                      wrote on last edited by
                      #17

                      @ar7s DM sent.

                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                      3x RTX 4090

                      1 Reply Last reply
                      0
                      • R Offline
                        R Offline
                        rickyc2024
                        Banned
                        wrote on last edited by
                        #18

                        @cyclone I wanted to speak with you about your vault decryptors. I am currently working on a vault decryptor for solflare wallet but I have had some issues with decrypting the vault data with secretbox as it dosen't seem to be encrypted with the wallet password. Can we speak in dms?

                        cycloneC 1 Reply Last reply
                        0
                        • R Offline
                          R Offline
                          rickyc2024
                          Banned
                          wrote on last edited by
                          #19

                          I also noticed that the structure of solflare vault data is almost identical to the structure of phantom but it doesn't seem to be using the wallet password.

                          1 Reply Last reply
                          0
                          • R rickyc2024

                            @cyclone I wanted to speak with you about your vault decryptors. I am currently working on a vault decryptor for solflare wallet but I have had some issues with decrypting the vault data with secretbox as it dosen't seem to be encrypted with the wallet password. Can we speak in dms?

                            cycloneC Online
                            cycloneC Online
                            cyclone
                            Admin Trusted
                            wrote on last edited by
                            #20

                            @rickyc2024 DM sent.

                            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                            3x RTX 4090

                            1 Reply Last reply
                            0
                            • S Offline
                              S Offline
                              shinexyz
                              wrote on last edited by
                              #21

                              Hi! thank you so much for this. I am super beginner, only started code with the help of claude recently...

                              I am trying to crack my own phantom wallet that I forgot the password (didn't write down the seed phrases... ). I have some clue on certain words that the password may contain (not sure either, but trying)

                              do I need both decryptor and extractor or just decryptor?

                              I managed to install GO and created exe file for windows (go build?) but when I tried with Key.txt (extracted from wallet), it didn't work..
                              (I tested on the phantom wallet which I know the password of, and used a random word list with the actual pass word inside) Any idea why this would be the case? Thanks so much!

                              cycloneC 1 Reply Last reply
                              0
                              • S shinexyz

                                Hi! thank you so much for this. I am super beginner, only started code with the help of claude recently...

                                I am trying to crack my own phantom wallet that I forgot the password (didn't write down the seed phrases... ). I have some clue on certain words that the password may contain (not sure either, but trying)

                                do I need both decryptor and extractor or just decryptor?

                                I managed to install GO and created exe file for windows (go build?) but when I tried with Key.txt (extracted from wallet), it didn't work..
                                (I tested on the phantom wallet which I know the password of, and used a random word list with the actual pass word inside) Any idea why this would be the case? Thanks so much!

                                cycloneC Online
                                cycloneC Online
                                cyclone
                                Admin Trusted
                                wrote on last edited by
                                #22

                                @shinexyz You'll need to first run phantom_extractor to extract the vault hash, then run phantom_decryptor with that hash and wordlist containing password candidates. Try cracking the example hash first to verify you've got everything figured out and working.

                                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                3x RTX 4090

                                1 Reply Last reply
                                0
                                • P Offline
                                  P Offline
                                  pavmojer
                                  wrote on last edited by
                                  #23

                                  Hi I saw this post from github
                                  @cyclone , could you tell me about this project?
                                  Can I recover my seed or password?

                                  cycloneC 1 Reply Last reply
                                  0
                                  • P pavmojer

                                    Hi I saw this post from github
                                    @cyclone , could you tell me about this project?
                                    Can I recover my seed or password?

                                    cycloneC Online
                                    cycloneC Online
                                    cyclone
                                    Admin Trusted
                                    wrote on last edited by
                                    #24

                                    @pavmojer
                                    Phantom crypto wallet passwords recoverable with my phantom_pwn toolset. The seed phrase is also recoverable once the password has been recovered, but is a multi-step process as described on my GitHub writeup.

                                    Read through this GitHub issue (walkthrough) and DM me if you run into any snags.
                                    https://github.com/cyclone-github/phantom_pwn/issues/14#issuecomment-2613081472

                                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                    3x RTX 4090

                                    1 Reply Last reply
                                    0
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    Who's Online [Full List]

                                    10 users active right now (7 members and 3 guests).
                                    v1cvap0r, hashpwn-bot, cyclone, casper_, freeroute, petrovivo1234

                                    Board Statistics

                                    Our members have made a total of 3.4k posts in 150 topics.
                                    We currently have 256 members registered.
                                    Please welcome our newest member, thatux.
                                    The most users online at one time was 49 on Thursday, December 26, 2024.

                                    • Login

                                    • Don't have an account? Register

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent