This tool is proudly the first publicly released Metamask Vault decryptor / cracker to support the new Metamask wallet vaults which have a dynamic iteration.
./metamask_decryptor_amd64.bin -h metamask_json.txt -w wordlist.txt
------------------------------------
| Cyclone's Metamask Vault Decryptor |
------------------------------------
Vault file: metamask_json.txt
Valid Vaults: 1
CPU Threads: 16
Wordlist: wordlist.txt
Working...
Decrypted: 0/1 5430.89 h/s 00h:01m:00s
- Supports previous Metamask vaults as well as new vaults with "KeyMetadata" which have dynamic iterations
- If you need help extracting Metamask vaults, use
Metamask Extractor
https://github.com/cyclone-github/metamask_extractor Metamask Vault Decryptor
will be superseded by hashcat once a custom hashcat kernel is released, however,Metamask Vault Decryptor
also displays the seed phrase alongside the vault password, which hashcat does not currently support
- Old vault format:
{"data": "","iv": "","salt": ""}
- New vault format:
{"data": "","iv": "","keyMetadata": {"algorithm": "PBKDF2","params": {"iterations": }},"salt": ""}
./metamask_decryptor.bin -h {wallet_json} -w {wordlist}
If the tool successfully decrypts the vault, tool will print the vault json, seed phrase and vault password
Decrypted Vault: '{}'
Seed Phrase: ''
Vault Password: ''
- If you want the latest features, compiling from source is the best option since the release version may run several revisions behind the source code.
- This assumes you have Go and Git installed
git clone https://github.com/cyclone-github/metamask_decryptor.git
cd metamask_decryptor
go mod init metamask_decryptor
go mod tidy
go build -ldflags="-s -w" metamask_decryptor.go
- Compile from source code how-to: