Try a demo with test vault files:
How does this work?
Upload your vault shares (.vult or .bak files) with optional passwords. The tool automatically detects the scheme (GG20 or DKLS) and reconstructs your private keys. You need more than half of the threshold files (2 of 2, 2 of 3, 3 of 5, etc).
Everything runs locally in your browser. No data is sent to any server.
How to use the recovered keys
- Bitcoin WIF keys can be imported into Electrum
- Ethereum private keys can be imported into MetaMask
- Cosmos private keys can be imported into Keplr
- This should be a one-time recovery. Vultisig's threshold security no longer protects you after importing into a single-key wallet.
CLI tool
Prefer the command line? Download pre-built binaries from GitHub Releases:
# macOS (Apple Silicon)
curl -sSL https://github.com/vultisig/community-tools/releases/latest/download/vsd_darwin_arm64.tar.gz | tar xz
# Linux (x86_64)
curl -sSL https://github.com/vultisig/community-tools/releases/latest/download/vsd_linux_amd64.tar.gz | tar xz
Then run:
./vsd recover --files share1.vult --files share2.vult
./vsd recover --files honeypot.bak --format json
Supports auto-detection of GG20/DKLS schemes, JSON output, and encrypted vaults. Keep the shared libraries in the same directory as the binary.
Test files
Download test shares from the GitHub repo:
- GG20: Test-part1of2.vult + Test-part2of2.vult
- GG20: honeypot.bak (single file)
- DKLS: TestDKLS1of2.vult + TestDKLS2of2.vult