Hash and Cipher Command Line Interface:
Introduction • Features • Installation • Usage • Examples • Contributing • Disclaimer • License • Contact
How to Use PGP Encryption:
Intro • Key Concepts • Setting Up • Encrypting Messages • Decrypting Messages • Key Management
Please send me a message on Github, email, or text if you would like to decrypt and use Zencrypt CLI. Its a VERY quick process; PLEASE do not hesitate to reach out.
I will provide you with everything to decrypt all of the files from the signed archive.
This is a kind remember to always verify and double check the validity of a program before installing anything, via the given fingerprints and SHA256 Checksums are ALWAYS supposed to match.
ryanshatch
5668E82AF338E8055DDC5C45A60912A538771BE8
By: Ryan Hatch
© 2023 Ryan Hatch
All Rights Reserved.
This project provides a command-line interface for managing hashes and encryption for input text. It includes both a Python and a Java implementation along with a lite version in C++.
- Generate and verify hashes with optional salt.
- Encrypt and decrypt text.
- Encrypt and decrypt files.
- PGP Encryption
To install Zencrypt, you will need to follow these steps:
- Clone the repository or download the source code with the command:
git clone https://github.com/ryanshatch/Zencrypt.git
. - Navigate to the
Python CLI
or to theJava CLI
directory. - Install the required dependencies with the command:
pip install -r requirements.txt
.
1. After installing the required dependencies, you can run the binary executable: zencrypt.exe
2. Select whether you want to hash, encrypt text, or parse files
and then follow the on screen instructions.
To exit the program, simply enter exit
.
1. After installing the required dependencies, you can now compile and run the Java program with the commands: javac Zencrypt.java
and java Zencrypt
2. Select whether you want to hash, encrypt text, or parse files
and then simply just follow the on screen instructions.
To exit the program, simply enter exit
Alternatively, you can avoid installing the dependancies by using the provided executable to run the binaries: zencryptCLI.exe
This guide provides an overview of how to use PGP (Pretty Good Privacy) encryption for securing digital communications. It covers the basics of PGP, including key concepts, setting up, encrypting and decrypting messages, and best practices for key management.
PGP encryption is a powerful tool for securing your digital communications. It's important to understand the basics of public and private keys and to follow best practices for key management and message encryption/decryption.
Remember, the strength of PGP encryption lies in the proper handling of your keys. Keep your private key secure and only share your public key with trusted contacts.
- Understanding Public and Private Keys.
- How PGP encryption works.
- Importance of key management.
To get started with PGP encryption, follow these steps:
- Select a PGP software.
- Generate your key pair.
- Share your public key.
- Secure your private key.
To encrypt a message using PGP, follow these steps:
- Write your message.
- Encrypt the message using the recipient's public key.
- Send the encrypted message.
To decrypt a received PGP message, follow these steps:
- Receive the encrypted message.
- Decrypt the message using your private key.
- Read the decrypted message.
Key management is crucial for maintaining the security of your PGP encryption. Follow these best practices:
- Keep your private key secure.
- Regularly update and manage your key pair.
- Use strong passwords for your private key.
- Fork the repository.
- Create a new branch with the command:
git checkout -b feature-branch
. - Make your changes.
- Commit your changes with the command:
git commit -am 'Add new feature'
. - Push to the branch with the command:
git push origin feature-branch
. - Create a new Pull Request.
Please reach out to me to verify and validate your ideas and contributions before continuing any further. Although contributions may be welcome, it will be discussed first.
After reaching out to me, please follow these steps:
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
This script is provided for educational and demonstration purposes only.
Use it responsibly and please adhere to all applicable laws and regulations.
I am absolutely immune from any responsibility in regaurds to any damages or loss of data caused by the
use, abuse, or misuse of this software.
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
<=>
This software is the property of the copyright holder and is protected by copyright laws. All rights are reserved. The copyright holder grants no implied or express license for the use, copying, modification, distribution, or reproduction of this software, in whole or in part, without the prior written permission of the copyright holder.
Any unauthorized use, copying, modification, distribution, or reproduction of this software, in whole or in part, is strictly prohibited and constitutes a violation of copyright law. Such unauthorized use may result in civil and/or criminal penalties, including but not limited to legal action and monetary damages.
To obtain permission for any use, copying, modification, distribution, or reproduction of this software, please contact the copyright holder at the following address: ryan@rshatch.com
By using this software, you acknowledge that you have read and understood the terms of this license and agree to comply with all applicable copyright laws.
Failure to abide by the terms of this license may subject you to legal consequences.
For any inquiries or suggestions, please contact me at ryan@rshatch.com.