Closed old-square-eyes closed 6 months ago
In newer versions of Firefox/Metamask the .sqlite's don't contain the vault data anymore. Instead the vault data is stored in a 'snappy framed data' file with just a number as its name at a path like this: [profile folder]/storage/default/moz-extension+++43352fdb-0195-4449-9a60-77b69a6b47d2^userContextId=4294967295/idb/3647222921wleabcEoxlt-eengsairo.files/98
I recently updated the script to be able to parse those files as well.
Have you tried running the script on your entire Firefox profile folder? That is the recommended way to use it.
Ok great. I will try. No, I was just gathering .sqlite files. Will the script run through recursively?
Yes, it recursively scans all files in the current folder
Got it! You're a champion.
MetaMask Vault Decryptor: Incorrect password.
Damn. Ah well. Was a sandbox wallet. Fun trying.
Hi. Thank you for this. I have tried the .sqlite I suspected was containing the wallet, but running the python script did nothing. So I grabbed all sqlite files from profiles > storage > default, and copied them into the dir and ran the python again. It completed very quickly. I'm assuming it iterates through (that's what the brief logging seems to imply). But then nothing happened again.
Should it run this quick? Any ideas on what I can try next?
Extension was from Mac OS / Firefox. Backed up this year, so reasonably recent.