Skip to content

Zencrypt is a tool deisgned for cryptographic operations such as hashing, encryption, and decryption. It allows users to generate and validate hashes with salt, encrypt and decrypt text along with file management.

Notifications You must be signed in to change notification settings

ryanshatch/Zencrypt

Repository files navigation


Zencrypt


Hash and Cipher Command Line Interface:

Introduction • Features • Installation • Usage • Examples • Contributing • Disclaimer • License • Contact


How to Use PGP Encryption:

Intro • Key Concepts • Setting Up • Encrypting Messages • Decrypting Messages • Key Management


Please send me a message on Github, email, or text if you would like to decrypt and use Zencrypt CLI. Its a VERY quick process; PLEASE do not hesitate to reach out.
I will provide you with everything to decrypt all of the files from the signed archive.


This is a kind remember to always verify and double check the validity of a program before installing anything, via the given fingerprints and SHA256 Checksums are ALWAYS supposed to match.

  • public key: ryanshatch

  • Fingerprint: 5668E82AF338E8055DDC5C45A60912A538771BE8

    By: Ryan Hatch

    © 2023 Ryan Hatch
    All Rights Reserved.


    Introduction

    This project provides a command-line interface for managing hashes and encryption for input text. It includes both a Python and a Java implementation along with a lite version in C++.

    • The Zencrypt CLI contains the full Zencrypt program that can provide functionality for hashing, encrypting text, encrypting files, along with full handling of PGP encryption.

    • The Zencrypt GUI is a basic form of Zencrypt V2 with the same functionalities and shortcut commands, but with a GUI.

    • The Java version is a clone copy of Zencrypt v3 with the inability to handle PGP encryption. All other functions remain the same.

    • The C++ version only allows basic hashing and encryption functions.

  • Features

    • Generate and verify hashes with optional salt.
    • Encrypt and decrypt text.
    • Encrypt and decrypt files.
    • PGP Encryption

    Installation

    To install Zencrypt, you will need to follow these steps:

    1. Clone the repository or download the source code with the command:
      git clone https://github.com/ryanshatch/Zencrypt.git.
    2. Navigate to the Python CLI or to the Java CLI directory.
    3. Install the required dependencies with the command: pip install -r requirements.txt.

    Usage

    Binary v3.0

    1. After installing the required dependencies, you can run the binary executable: zencrypt.exe
    2. Select whether you want to hash, encrypt text, or parse files and then follow the on screen instructions.

    To exit the program, simply enter exit.

    Java Version

    1. After installing the required dependencies, you can now compile and run the Java program with the commands: javac Zencrypt.java and java Zencrypt
    2. Select whether you want to hash, encrypt text, or parse files and then simply just follow the on screen instructions.

    To exit the program, simply enter exit



    Alternatively, you can avoid installing the dependancies by using the provided executable to run the binaries: zencryptCLI.exe

    Examples



    Hashing:

    Hashing Example



    Cipher:

    Cipher Example



    Encrypting Files:

    Cipher Example



    PGP Encryption:

    Cipher Example



    How To Use PGP Encryption:


    Intro

    This guide provides an overview of how to use PGP (Pretty Good Privacy) encryption for securing digital communications. It covers the basics of PGP, including key concepts, setting up, encrypting and decrypting messages, and best practices for key management.
    PGP encryption is a powerful tool for securing your digital communications. It's important to understand the basics of public and private keys and to follow best practices for key management and message encryption/decryption.

    Remember, the strength of PGP encryption lies in the proper handling of your keys. Keep your private key secure and only share your public key with trusted contacts.

    Key Concepts

    • Understanding Public and Private Keys.
    • How PGP encryption works.
    • Importance of key management.

    Setting Up

    To get started with PGP encryption, follow these steps:

    1. Select a PGP software.
    2. Generate your key pair.
    3. Share your public key.
    4. Secure your private key.

    Encrypting Messages

    To encrypt a message using PGP, follow these steps:

    1. Write your message.
    2. Encrypt the message using the recipient's public key.
    3. Send the encrypted message.

    Decrypting Messages

    To decrypt a received PGP message, follow these steps:

    1. Receive the encrypted message.
    2. Decrypt the message using your private key.
    3. Read the decrypted message.

    Key Management

    Key management is crucial for maintaining the security of your PGP encryption. Follow these best practices:

    1. Keep your private key secure.
    2. Regularly update and manage your key pair.
    3. Use strong passwords for your private key.

    Contributing

      Please reach out to me to verify and validate your ideas and contributions before continuing any further. Although contributions may be welcome, it will be discussed first.

      After reaching out to me, please follow these steps:

    1. Fork the repository.
    2. Create a new branch with the command: git checkout -b feature-branch.
    3. Make your changes.
    4. Commit your changes with the command: git commit -am 'Add new feature'.
    5. Push to the branch with the command: git push origin feature-branch.
    6. Create a new Pull Request.

    DISCLAIMER!

    <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=>

    This script is provided for educational and demonstration purposes only.
    Use it responsibly and please adhere to all applicable laws and regulations.

    This script is provided for educational and demonstration purposes only. Use it responsibly and adhere to all applicable laws and regulations.

    I am absolutely immune from any responsibility in regaurds to any damages or loss of data caused by the
    use, abuse, or misuse of this software.

    <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=> <=>


    Liscense

    This software is the property of the copyright holder and is protected by copyright laws. All rights are reserved. The copyright holder grants no implied or express license for the use, copying, modification, distribution, or reproduction of this software, in whole or in part, without the prior written permission of the copyright holder.

    Any unauthorized use, copying, modification, distribution, or reproduction of this software, in whole or in part, is strictly prohibited and constitutes a violation of copyright law. Such unauthorized use may result in civil and/or criminal penalties, including but not limited to legal action and monetary damages.

    To obtain permission for any use, copying, modification, distribution, or reproduction of this software, please contact the copyright holder at the following address: ryan@rshatch.com


    By using this software, you acknowledge that you have read and understood the terms of this license and agree to comply with all applicable copyright laws.
    Failure to abide by the terms of this license may subject you to legal consequences.


    Contact

    For any inquiries or suggestions, please contact me at ryan@rshatch.com.

    About

    Zencrypt is a tool deisgned for cryptographic operations such as hashing, encryption, and decryption. It allows users to generate and validate hashes with salt, encrypt and decrypt text along with file management.

    Topics

    Resources

    Stars

    Watchers

    Forks