Open-source forensic recovery for crypto wallets where partial information still exists. No promises for the impossible. No magic. Just the toolchain artisan recovery shops have always used, finally productized.
Standard BIP-39 test vector. 11 known words, 12th unknown, target ETH address known. Phoenix brute-forces all 2048 candidates in parallel, filters checksum-valid, derives the address, matches.
$ phoenix reconstruct \
--template "abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon ?" \
--target "0x9858effd232b4033e47d90003d41ec34ecaeda94" \
--kind eth \
--index-range 1
✓ Recovered word: about
Address index : 0
Mnemonic : abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon abandon about
Elapsed : 72.12ms
| Sprint | Output | Tag | Status |
|---|---|---|---|
| Hafta 1 | Foundation (Tauri + Rust + React + CI) | week-1-foundation | Done |
| Hafta 2 | Cognitive Interview MVP | week-2-cognitive-interview | Done |
| Hafta 3 | Forensic Layer A | week-3-forensic-a | Done |
| Hafta 4+6 | Multi-word + passphrase + Hashcat + mbox + threat model v1 | week-4-6-extended | Done |
| Hafta 5 | Cryptographic Core | week-5-crypto-reconstruct | Done |
| Hafta 7 | First real pilot recovery | — | Blocked: needs real users |
| Hafta 8 | Trail of Bits audit · public launch | — | Blocked: needs funding |
Phoenix is a desktop app. Three commands:
# 1. clone + build the workspace
cd C:\Users\enesa\phoenix
cargo build --workspace
# 2. quick sanity check
cargo run -p phoenix-cli -- doctor
cargo run -p phoenix-cli -- ollama-check --model qwen3:14b
# 3. launch the desktop app
cd src-tauri
cargo tauri dev
The app opens with five routes: Welcome · Interview · Reconstruct · Import · Settings.
Try the Reconstruct route with the test vector above to confirm everything works.