Releases: psdurco/kodektep
KodeKTep v1.1.1 - Windows - beta
🧅 KodeKTep - Encryption
"Not everything that looks like a PDF is just a document."
KodeKTep is a file encryption and stealth packaging tool. Created for those who value true privacy, digital disguise, and content security.
🔐 What does KodeKTep do?
- Encrypts the contents of any file (text, image, spreadsheet, code, etc.)
- Merges the encrypted result into a base file (like a PDF, image, or executable)
- Produces a perfectly functional file that appears normal but contains hidden content
- Generates a
.keysfile containing the decryption metadata, essential for recovering the original content
With this, you can hide:
- An executable inside an image
- A video inside a
.txtfile - A secret document inside another PDF
- Or even a photo inside another photo—keeping the host file fully operational
KodeKTep Particularities:
KodeKTep is not just an encryption tool — it's an oracle of silent chaos.
Its layers go beyond traditional protection, offering mechanisms that confuse, delay, and disorient reverse engineering attempts. Some of its unique characteristics include:
- Multi-layer dynamic encryption (cryptographic matryoshka)
- Embedded fake digital signatures (real file headers)
- Intelligent honeypots with randomized encrypted data
- Preservation of the original host file’s date and timestamp
What appears to be, often isn’t.
Silence is a language.
📦 What does this repository contain?
At this stage, we're releasing only the Windows executable GUI and CLI (kodektep.exe, kodektep-cli.exe). Future versions for Linux will be added soon.
🚀 How to use
🧪 Encrypting a file
- Run
kodektep.exe - Select mode: Encrypt
- Choose the file you want to protect (e.g.,
image.jpg) - (Optional) Select a base file (e.g.,
document.pdf) to host the hidden data - Click Run
- The program will generate:
- A new file with
_ocsuffix (e.g.,document_oc.pdf) - A
.keysfile (e.g.,document_oc.pdf.keys) essential for decryption
- A new file with
If no base is used, the output file will have the
.ocpherextension
🧹 Decrypting a file
- Run
kodektep.exeagain - Select mode: Decrypt
- Choose the previously generated file (e.g.,
document_oc.pdf) - Ensure the corresponding
.keysfile is in the same folder with the same base name - Click Run
- The original file will be restored with its name +
+KodeKTep(e.g.,image+KodeKTep.jpg)
🛡 About security
- Without the
.keysfile, decryption is mathematically infeasible - Each operation generates unique and random AES keys and IVs
- The final file is fully functional (opens like a normal file) but secretly contains hidden data
📌 Important Notes
- The project is not yet open-source, but partial release may happen later
- Your security depends on the preservation of the
.keysfile. If lost, the content is irretrievable
📬 Contact
This project was created by Paulo Sergio Durco (@psdurco)
If you’d like to collaborate, test future versions, or support the project, feel free to open an issue or reach out (link coming soon).
KodeKTep v1.0.1-windows-gui - Alpha
🧅 KodeKTep - Encryption
"Not everything that looks like a PDF is just a document."
KodeKTep is a file encryption and stealth packaging tool. Created for those who value true privacy, digital disguise, and content security.
🔐 What does KodeKTep do?
- Encrypts the contents of any file (text, image, spreadsheet, code, etc.)
- Merges the encrypted result into a base file (like a PDF, image, or executable)
- Produces a perfectly functional file that appears normal but contains hidden content
- Generates a
.keysfile containing the decryption metadata, essential for recovering the original content
With this, you can hide:
- An executable inside an image
- A video inside a
.txtfile - A secret document inside another PDF
- Or even a photo inside another photo—keeping the host file fully operational
📦 What does this repository contain?
At this stage, we're releasing only the Windows executable (kodektep.exe). Future versions for Linux, macOS, and CLI will be added soon.
🚀 How to use
🧪 Encrypting a file
- Run
kodektep.exe - Select mode: Encrypt
- Choose the file you want to protect (e.g.,
image.jpg) - (Optional) Select a base file (e.g.,
document.pdf) to host the hidden data - Click Run
- The program will generate:
- A new file with
_ocsuffix (e.g.,document_oc.pdf) - A
.keysfile (e.g.,document_oc.pdf.keys) essential for decryption
- A new file with
If no base is used, the output file will have the
.ocpherextension
🧹 Decrypting a file
- Run
kodektep.exeagain - Select mode: Decrypt
- Choose the previously generated file (e.g.,
document_oc.pdf) - Ensure the corresponding
.keysfile is in the same folder with the same base name - Click Run
- The original file will be restored with its name +
+KodeKTep(e.g.,image+KodeKTep.jpg)
🛡 About security
- Without the
.keysfile, decryption is mathematically infeasible - Each operation generates unique and random AES keys and IVs
- The final file is fully functional (opens like a normal file) but secretly contains hidden data
📌 Important Notes
- The project is not yet open-source, but partial release may happen later
- Your security depends on the preservation of the
.keysfile. If lost, the content is irretrievable
📬 Contact
This project was created by Paulo Sergio Durco (@psdurco)
If you’d like to collaborate, test future versions, or support the project, feel free to open an issue or reach out (link coming soon).