This program functions by taking in a key as an ASCII value and scrambling your zip file's byte composition to render it unusable.
If an incorrect password is typed in, the program will proceed to de-scramble the file by its values, but consequently make the zip file an unusable and unobtainable mess. It can be reversed, obviously, if you know how the code works.
It is programmed to trigger a hidden .safe.py
file, which I have not included for obvious reasons (it's dangerous). You can program it to do whatever you like.
This code will function properly even without the .safe.py
file, as that's the final line of code and so it won't interrupt anything involving the encryption/decryption.
- Create a folder and throw in whatever you wish to encrypt.
- Zip the folder and make sure that there is no
.ohwrd
file present. - Run the program, it asks for a password to use as ASCII key values.
- It will save your scrambled/encrypted zip file as
Gallifrey.ohwrd
- keep this file. - Delete the original zip file.
Do you wonder why I named it the Dr Who encryption in reverse, or why it saves your encrypted zip as Gallifrey.ohwrd
(.drwho
backwards)?
That's because the file will continue to transform into a zip file, even if your password is incorrect - if the password is incorrect, that'll seriously corrupt or regenerate your file into an unreadable and bad zip file.
Sorry, lol.
- Make sure your
Gallifrey.ohwrd
file is in the same directory asrun.py
, and that there's no zip files present. - Enter your password, same interface.
- It'll use the ASCII values of your entered password to unscramble the zip file. If correct, then the zip file will be fully restored - if incorrect, it'll create an awfully corrupted binary file in a zip shell.
- If password is correct, your zip file is fully restored. Just delete the
Gallifrey.ohwrd
if you want.