Download the latest version (v1.1.1)
"Not everything that looks like a PDF is just a document."
KodeKTep is a file encryption and stealth packaging tool. Created for those who value true privacy, digital disguise, and content security.
- Encrypts the contents of any file (text, image, spreadsheet, code, etc.)
- Merges the encrypted result into a base file (like a PDF, image, or executable)
- Produces a perfectly functional file that appears normal but contains hidden content
- Generates a
.keysfile containing the decryption metadata, essential for recovering the original content
With this, you can hide:
- An executable inside an image
- A video inside a
.txtfile - A secret document inside another PDF
- Or even a photo inside another photoβkeeping the host file fully operational
KodeKTep Particularities: KodeKTep is not just an encryption tool β it's an oracle of silent chaos.
Its layers go beyond traditional protection, offering mechanisms that confuse, delay, and disorient reverse engineering attempts. Some of its unique characteristics include:
- Multi-layer dynamic encryption (cryptographic matryoshka)
- Embedded fake digital signatures (real file headers)
- Intelligent honeypots with randomized encrypted data
- Preservation of the original host fileβs date and timestamp
What appears to be, often isnβt. Silence is a language.
At this stage, we're releasing only the Windows executable GUI and CLI (kodektep.exe, kodektep-cli.exe). Future versions for Linux will be added soon.
- Run
kodektep.exe - Select mode: Encrypt
- Choose the file you want to protect (e.g.,
image.jpg) - (Optional) Select a base file (e.g.,
document.pdf) to host the hidden data - Click Run
- The program will generate:
- A new file with
_ocsuffix (e.g.,document_oc.pdf) - A
.keysfile (e.g.,document_oc.pdf.keys) essential for decryption
- A new file with
If no base is used, the output file will have the
.ocpherextension
- Run
kodektep.exeagain - Select mode: Decrypt
- Choose the previously generated file (e.g.,
document_oc.pdf) - Ensure the corresponding
.keysfile is in the same folder with the same base name - Click Run
- The original file will be restored with its name +
+KodeKTep(e.g.,image+KodeKTep.jpg)
- Without the
.keysfile, decryption is mathematically infeasible - Each operation generates unique and random AES keys and IVs
- The final file is fully functional (opens like a normal file) but secretly contains hidden data
- The project is not yet open-source, but partial release may happen later
- Your security depends on the preservation of the
.keysfile. If lost, the content is irretrievable
This project was created by Paulo Sergio Durco (@psdurco)
If youβd like to collaborate, test future versions, or support the project, feel free to open an issue or reach out (link coming soon).