Skip to content

Phydon/gib

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

90 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WARNING

=> always backup your files before using this program

=> this is NOT a very secure way of encrypting your files

gib

turning text into gibberish

quick file en-/decoding "on the fly"

Tests

Supported en-/decoding // en-/decrypting methods:

  • base64 (constant time)
  • caesar cipher
  • chacha20poly1305
  • hex
  • l33t
  • xor

Hashing algorithms

  • argon2id (low memory)

Usage

Short Usage

Usage: gib [OPTIONS] [PATH] [COMMAND]

Commands:
  log, -L, --log  Show content of the log file
  help            Print this message or the help of the given subcommand(s)

Arguments:
  [PATH]  Add a path

Options:
  -c, --copy
          Create a copy of the file
  -d, --decode <DECODING/DECRYPTING METHOD>
          Decode/Decrypt the file
  -e, --encode <ENCODING/ENCRYPTING METHOD>
          Encode/Encrypt the file
  -H, --hash
          Return the hash of a file
  -3, --l33t <Mode>
          Set l33t mode [default: soft] [possible values: soft, hard]
  -l, --list
          List all available en-/decoding // en-/decrypting methods
  -s, --sign
          Verify a file with a signature
  -h, --help
          Print help (see more with '--help')
  -V, --version
          Print version

Long Usage

Usage: gib [OPTIONS] [PATH] [COMMAND]

Commands:
  log, -L, --log  Show content of the log file
  help            Print this message or the help of the given subcommand(s)

Arguments:
  [PATH]
          Add a path

Options:
  -c, --copy
          Create a copy of the file in the config directory

  -d, --decode <DECODING/DECRYPTING METHOD>
          Decode/Decrypt the file

  -e, --encode <ENCODING/ENCRYPTING METHOD>
          Encode/Encrypt the file
        
  -H, --hash
          Return the hash of a file
          hashing algorithm: [ argon2id ]        

  -3, --l33t <Mode>
          Set l33t mode

          [default: soft]
          [possible values: soft, hard]

  -l, --list
          List all available en-/decoding // en-/decrypting methods

  -s, --sign
          Verify a file with a signature

  -h, --help
          Print help (see a summary with '-h')

  -V, --version
          Print version

Installation

Windows

via Cargo or get the binary