encutil

File encryptor

A command-line utility for encrypting files with the defuse/php-encryption library

Example of how to build a command-line file encryption utility with defuse/php-encryption.

GitHub

20 stars
3 watching
7 forks
Language: PHP
last commit: over 8 years ago

Related projects:

Repository Description Stars
elasticdog/transcrypt A tool to transparently encrypt files in a Git repository. 1,487
goliate/hidden-tear A file crypter that uses the AES algorithm to encrypt files and sends the encryption key to a remote server for decryption. 736
alichtman/deadbolt A file encryption tool that uses AES-256 to protect files and allows easy decryption with a password 344
tsusanka/fileencrypt A program that uses encryption to secure files by transforming their contents into unreadable data 9
moteus/lua-aesfileencrypt A Lua library that provides a simple way to encrypt files using AES encryption. 18
ciphershed/ciphershed Cross-platform encryption software allowing users to on-the-fly encrypt files and data 647
bing0o/simple_ransomware A Python script that encrypts system files using the pyCrypto library. 8
spieglt/cloaker A simple file encryption tool that allows users to protect and decrypt files with a password. 409
carnage/doctrine-encrypted-column Provides a secure way to encrypt data stored through an object-relational mapping system 35
shlemph/ipfsecret Encrypts and decrypts IPFS files with a secret passphrase 26
drupal/core-vendor-hardening Automates removal of unnecessary directories and configuration to secure vendor directories in web applications 14
remobile/react-native-des A cryptographic library for secure data encryption and decryption in React Native applications 22
mailvelope/mailvelope A browser extension for secure email communication using OpenPGP encryption. 1,707
mogilvie/encryptbundle A bundle for encoding and decoding parameters using OpenSSL and Doctrine lifecycle events in Symfony applications 93
bitbeans/streamcryptor A C# project for secure file encryption and decryption using stream-based approach and cryptographic libraries. 131