Skip to content

A tool to locate and extract Armory wallets on corrupted and deleted hard drives

License

Notifications You must be signed in to change notification settings

RecRanger/armory-wallet-checksum-searcher

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

85 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

armory-wallet-checksum-searcher

A tool to locate and extract Armory wallets on corrupted and deleted hard drives.

Features

  • Searches a drive image for deleted and corrupted armory wallet files, based on a checksum property within the file.
  • Writes to a log file and ndjson.
  • Supports raw disk images (dd-style).

Benchmarks

  • 8 MiB/s - 1 TiB takes 1.5 days

Process

  • Armory wallets have a 32-byte private key, followed by a 4-byte sha256d hash of that key.
  • By taking every group of 36 bytes on the drive image, performing the checksum validation (a sha256d hash) on the first 32 bytes, and seeing if they match the final 4 bytes, we can find all parts that are "probably private keys".
  • After you find these keys, use a tool like ku to convert them to usable keys.
  • Refer to the Armory documentation outlining the checksum format: https://www.bitcoinarmory.com/wallet-format/

Usage

Install from crates.io, and then run:

cargo install armory_wallet_checksum_searcher
armory_wallet_checksum_searcher -i input_file.img --log ./output_log.log --ndjson ./output_records.ndjson

Or, clone from source and run:

git clone https://github.com/RecRanger/armory-wallet-checksum-searcher
cargo run --release -- -i input_file.img --log ./output_log.log --ndjson ./output_records.ndjson
sudo cargo run --release -- -i /dev/sda --log ./output_log.log --ndjson ./output_records.ndjson

Contributing

Please Star this repo if it's helpful. Open Issues.

Resources

About

A tool to locate and extract Armory wallets on corrupted and deleted hard drives

Resources

License

Stars

Watchers

Forks

Packages

No packages published