Frequently Asked Questions

Yes, and the Encryption tool itself is encrypted. Which means, no one gets to see how it works.

You'll be licensed to use it on your own private hosts for a specific period of time. And after that period of time expires, the Encryption tool will no longer work. However, the scripts that were encrypted with the Encryption tool during the period when the Encryption tool license was valid, will continue to work for as long as they were configured to be.

To renew your license for the Encryption tool so you can continue to protect additional scripts, visit the home page or click any of the green boxed options to the right of this page for a (30-Day) License.

All of our Encryption tools (Shell, Perl, Ruby, Python, Nodejs, Php and Rcode) allow you to:

  1. Encrypt and Obfuscate as many scripts as you want from the command line
    • - All you really have to do is run one simple command, with arguments passed to it
  2. Avoid having to copy and paste sensitive scripts to an external website
    • - Sensitive scripts can be:
        - Any script with usernames and passwords stored in it
        - Any script containing proprietary information you don't want to make public
  3. Set expiration dates on all scripts encrypted
    • - Expiration dates prevent the usage of your scripts after a predetermined time
        - You can set your protected scripts to auto self destruct upon expiration
  4. Encrypt the same file or script each time it is updated
  5. Be able to use your encrypted scripts on most UNIX OSes
    • - This portability ensures you never have to require your users to compile a script for any specific OS
        - Works on Linux, AIX, MacOS & Android
  6. Get email notifications whenever attempts are made to modify or make copies of your script
  7. Encrypt and obfuscate not just shell scripts but ruby, perl, python, command line nodejs and php scripts as well
  8. Encrypt multiple scripts and files with a simple one liner and a list file
    • - Avoid time consuming or complicated procedural steps!
      - Encrypt multiple scripts at once, using our newly developed menu driven interface
  9. Free Support: Reach out to us at [ ] if you require technical assistance
  10. Restrict the usage of your scripts to specific users
    • - Ensure even root can't run a script owned by you! - Give only a specific list of users access to use your scripts - Get alert notifications whenever an unauthorized user attempts to use your scripts
      -We will generate the notifications on all attempted nefarious activities
  11. Limit the usage of your scripts to specific hosts / servers
    • - Ensure even if your script gets in the hands of the wrong people, they wont be able to run it if they're not on the right host.
Yes. Your encrypted scripts will work on Macs and any Unix OS. Initially, our Encryption tool (and all the scripts it produced) was compatible with only Mac, Linux & AIX operating systems. However, due to high demand from Windows users, we have now incorporated the Windows Operating system into the list of compatible OSes.

Please note, to utilize your encrypted scripts on Windows systems, you'll need to install the Bash Application (which can be selected during the Windows Bash setup process). Contact us for more information.
  1. Credit Card (Visa/Mastercard/Maestro-Laser/Amex)
  2. Paypal (Discover cards are accepted by Paypal)
  3. EUR/USD Cheque/Check
  4. Wire/Bank Transfer
  5. Bitcoin 2 PayPal :
All protected scripts are designed to send out notifications by default in the event of a hack attempt. Notifications will NOT be sent out IF the user runs the protected script as "expected" and "does not" try to figure out how it works!

Why are notifications sent out to begin with?

Think of it as an alarm system. The reason you're on this site is because you want to keep your source code hidden and secure. If attempts are made to crack your home security system, wouldn't you like to know the identities of the perpetrators?

If you do not wish to allow notifications to be sent out to us whenever your encrypted scripts are tampered with, simply create/touch a "notracking" file in the encryption directory. Whenever you encrypt a script, if the encryption tool finds the "notracking" file in the encryption directory, it will NOT insert any tracking code in the script being encrypted.
    When you encrypt a script, you get to specify how long the script will be valid for and as the owner of the script, there are a few different options available to you.

    (1). The Daily Subscriptions allow users to submit up to 2 scripts per day (for $1.95 p/day) or an unlimited number of scripts (for $5.95 p/day) through our online portal. Subscription can be canceled or suspended immediately after payment by simply clicking the "Cancel Active Subscriptions" link.

    (2). The Monthly ($29.95) Subscription allows users to submit an unlimited number of scripts (on a monthly basis) through our online portal. As with the daily option, subscription can be canceled or suspended immediately after payment by simply clicking the "Cancel Active Subscriptions" link.

    (3). The 3-Month ($109.95) / 6-Month ($209.95) / 1-Year (399.95) Licenses includes the actual Encryption tool, which you can use on your own private hosts, without having to upload or paste your scripts to our online portal. During the duration of any of these licenses, you will be allowed to encrypt an unlimited number of scripts. Once license has expired, you will no longer be able to encrypt any additional scripts nor will you be able to re-encrypt new versions of already encrypted scripts. However, all scripts which were encrypted during the valid period of the license will continue to work until the expiration date you assigned to them has expired. If you do not wish for your encrypted scripts to expire, simply specify '7000d' as the expiration date.

    (4). The Enterprise option ($899.95) allows you to use the Encryption tool on an unlimited number of scripts, for as long as you need it, each year. This License comes with one month of free support. If necessary, that can be extended to 45 days. And after the free support period has expired, we can discuss payment details for continued support, if needed.

      PayPal will bill your account on a yearly basis for a flat payment of $899.95 (you can cancel subscription any time).

Upon payment verification, the latest version of the Encryption tool will be automatically generated and the download link for it will be sent to you. You'll receive it within 30 to 60 seconds of payment completion. Unless requested otherwise, the download link will be sent to the email address of the account that payment was made with.
No. You do not need to encrypt the scripts on the server or host they will run on. There's no need to encrypt your scripts for each OS.

You can encrypt a script on any Mac, Ubuntu or Red Hat system and then be able to run the encrypted script on other Unix systems or Windows(Bash). So far, scripts that were encrypted by us have been tested and verified to work on Ubuntu, Red Hat, CentOS, Windows(Bash), AIX and Embedded (watered-down) Unix systems...i.e. busybox or Android.

1. unzip the-zip-file-containing-your-encrypted-script

2. cd

3. ./ (replace this with your script name)
    - the first run of your encrypted script will set it up for you
4. ./
    - After the previous first run of your script, you can now begin using it as normal and if desired, you can copy the script to other Unix hosts and it will run without needing to re-install itself.
Contact Us if you encounter any issues while attempting to run your encrypted script.

What is a menu driven / interactive script? An example of such a script would be any script that waits for a response:

    What is your name?
    Do you wish to proceed (y/n)?

Notice how the above prompts are waiting on the user for a response?

Here's how your interactive script should look if it is to be encrypted:

      Example A
          echo "Hello there"
          echo -e "What is your first name?" > /dev/tty
          read x < /dev/tty
          echo $x
          echo "What is your last name?" > /dev/tty
          read y < /dev/tty
          echo "Your name is $x $y"

      Example B
          echo -n "How many random numbers do you want to generate? " > /dev/tty
          read max < /dev/tty
          for (( start = 1; start <= $max; start++ ))
          echo -e $RANDOM
Basically, you have to direct all questions being asked in your script to > /dev/tty.

Then, when you go to read the response provided by the user, you read from the same tty as before, with the < /dev/tty.

Contact us at [ ] if you need additional help with other languages...i.e. python, ruby, perl.
There are 5 reasons an encrypted script wouldn't work:

  1. 'gawk' is not installed on your system
    • - The gawk tool should be available by default. If your system does not have it, simply install it.
      • apt-get install gawk
      • yum install gawk

  2. If the script is an interactive script and wasn't edited correctly.
    • - To resolve this, please refer to Help A. (above) and follow the instructions.

  3. If the encrypted script is run in an unusual way
    • i.e:
    • sh ./
    • instead of

    • ./
      • There's no need to put a "sh" or "bash" or anything else before the script when running it.

  4. If the first line of your script does not contain the absolute path to the necessary intepreter.
    • i.e:
    • #!/bin/sh
    • #!/bin/bash
    • #!/usr/bin/env perl, ruby, python...etc??

  5. A deliberate attempt was made to tamper with the encrypted script in order to figure out how it works.
    • We are quite aware that our encryption methodology is unique and there is absolutely nothing like it anywhere else on the internet. For this reason, there will be many hackers who will try to break it apart in an effort to replicate it or for some other nefarious reason.
    • To successfully combat this, a series of sensitivity checks are included in all protected scripts. What that means is, whenever our encryption mechanism detects that a user is attempting to do things with an encrypted script that he shouldn't be doing, we will automatically cause the script to self destruct.
    • We take the security of every script encrypted with us very seriously and we do not tolerate any hack attempts to figure out how it works.

    If your script self-destructs, the only way to get it working again is to re-unzip the zip package and re-install it.
Contact us at [ ] if you need additional help. In your email, make sure to provide a copy and paste of all the steps (and their results) that you performed.

If your script was designed to work on embedded or android systems, all you have to do is specify "embedded" or "android-rb" when encrypting it from the command line.

Review the following examples for references to the different ways scripts can be encrypted for use on specific systems.

Example (scripts to be used on regular Unix systems):
    root@virtual# ./enscryption lcs autogenerate 2d customer /home/jbowman/

Example (scripts to be used only on Android Unix systems):
    root@virtual# ./enscryption lcs android-rb 2d customer /home/jbowman/

Example (scripts to be used only on other systems):
    root@virtual# ./enscryption lcs embedded 2d customer /home/jbowman/
Then copy/scp the bolded encrypted zip file to the system or device you intend to use it on.
Other Options: The other 3 options allow you to encrypt one script at a time. You can encrypt as many scripts as you want (or as many as is allowed based on the package you purchased), however, they'll need to be encrypted one by one, after each other.

Enterprise Option: This option allows for the encryption of large quantities of scripts. For instance, if you wish to encrypt multiple scripts at a time without having to manually encrypt them all from the command line, this is the option for you. Additionally, with the enterprise option, you can choose to put all your protected scripts into one zip or tar file, thereby making it quite convenient to deliver or distribute to clients.

  • When a client gets the zip or tar file, they'll just have to do simply run the automated script (which is included in all packaged zip/tar files), specify the path to install the scripts (as a parameter) and that's it. The automation script will take over from that point and will proceed to set everything in place, all in under 30 seconds.
Detailed instructions on how to encrypt a script is included in the encryption package.

If you need to view the encryption process before making a payment, please refer to the following:

## ./enscryption lcs autogenerate 375d customer /home/jserver/MIGRATE/

SUCCESS: Code has been successfully generated!

SUCCESS: Updated [ /var/tmp/ ]. Expiration time = [ 1510240090 ( Thu Nov 9 07:08:10 PST 2017 ) ]. Customer Name = [ ]. Customer ID = [ 38700212630710300808102016 ].

To begin using your encrypted script, simply unzip the generated zip file [ ], change directory to the directory, then run the script: './<your-script>'.

During encryption, here are the parameters to change for your specific requirements:

375d = This is where you specify how long the script to be encrypted should be valid for. To specify minutes, hours, weeks or months, replace the 'd'

  • 30m = 30 minutes
  • 3h = 3 hours
  • 3d = 3 days
  • 3w = 3 weeks
  • 3mo = 3 months
  • 7000d ~ 19 Years (or perpetually) = Replace this email address with yours

/home/jserver/MIGRATE/ = Specify the absolute path of the script you wish to encrypt
Yes it is safe to install an encrypted script and no, it will not affect anything on your system. Our installation procedures DO NOT involve tampering with any configurations, libraries or modules that may already exist on your system.

Yes you can. Under the Enterprise option, we have an automated, menu driven tool (MDI) that allows users to complete the encryption and obfuscation of several scripts within seconds.

Click the link below to view a screenshot of this tool:

Yes, this tool comes with all of our Enterprise encryption packages (shell, perl, python, php, ruby, rcode, nodejs).
Yes. After encryption, you can expect your script to behave exactly as it was before it was encrypted. Only difference will be, after encryption, no one will be able to view the actual code.

No. Once encrypted, it cannot be decrypted. We recommend creating backups of your original un-encrypted script.
With the series of updates we recently applied (March, 2017) to the Encryption tool, users no longer need to worry about installing encrypted scripts in any particular directory!

After a script has been encrypted, unzipped and run for the first time on the same host on which it was encrypted, it can be copied to other Unix hosts and it will work without requiring further setup. This process is equivalent to never having to recompile a package for different Unix flavors or architectures. Just copy the encrypted script to the host you want it to be on, and it will work!

Feel free to contact us at [ ] if you need additional clarifications.
Currently, our encryption algorithm can be used to protect shell, perl, ruby, python, rcode, command line nodejs and php scripts. Those were the most commonly requested languages for encryption.

If the script you wish to encrypt and obfuscate is written in a different unlisted language, no worries. Feel free to contact us at [ ] and provide the following information:

    • The name of the interpreted language your script is written in
    • A sample code written in this interpreted language
    • How you normally go about running the script from the command line
    • The Unix OS(es) you intend to run the protected/encrypted scripts on
Please note, as of right now, our encryption method is designed and built only for Unix/Linux based systems.
  1. Date Management - Assign expiration dates to your scripts
  2. License Management - Regulate the redistribution of all your scripts
  3. User Management - Restrict usage of your scripts to specific Users
  4. Host Management - Restrict usage of your scripts to specific Hosts
  5. Duplication Prevention - Prevent multiple copies of your scripts on a system
  6. Instance Management - Restrict simultaneous or multiple running instances of your scripts
  7. Tamper Resistance - Auto self-destructs whenever a user tries to figure out how it works
    • a) Ensures an encrypted script does not function if it detects that a necessary tool on the system has been altered
          Some users may build a modified version of a binary and then try to use that version to investigate our encryption/obfuscation algorithm.
            - The tamper resistance feature will detect this and will stop the script from working!
      b) Ensures that a protected script never works if the user is doing anything other than running it.
        - There are many interesting ways users can attempt to break a protected script.
        • We monitor for this and we block them at every turn.
      c) Ensures it is impossible for any user to modify a protected script
  8. Access Management - Remotely turn off ability to continue using your script if user is found to be in violation of licensing terms.
    1. Some users have nefarious intentions when they purchase online software. After purchasing a software, these users typically request a refund immediately after. And after the refund is given, they continue to use the software.
      • puts an end to this. Our customers have the option to make their script require internet connectivity.
          • If a customer opts to make her script require internet connection, then users of the script will NOT be able to run the script if they're not connected to the internet.
              - This provides script owners control of their commercial scripts in case a user misbehaves.
  9. Report Generator - Get color coded excel spreadsheets detailing where your script(s) are being used.
    • a). Know when your script is being illegally used
      • If your script was meant to be used at the office in San Francisco but you find out it is now being used in France as well, you might want to know how that happened.

Yes. We offer a 60-Day Money Back Guarantee. Refunds will be granted only under 1 condition:

    • If you are actually able to successfully unlock any of our encrypted scripts in under 60 days.
      • Under this scenario, to qualify for the refund, we'll need to see proof.
Contact us at [ ] if you have any questions.
It is highly unlikely for that to happen. One of the many unique attributes that makes our EnScryption tool secure is the fact that it is strenghtened on a very frequent basis and the frequency with which it is updated is based solely on the discovery or detection of newly developed hacking tactics.

Since the inception of our website, many users have attempted to break our encryption algorithm. In the very early stages of our tool, some were actually able to crack open a few doors, and once that happened, we detected it and promptly closed the associated loopholes. Given the continous implementations of several countermeasures similar to this, we feel confident that our encryption tool as it stands right now and going forward, is strong enough to ensure access to your most sensitive scripts is well guarded!

If you want more assurance that our Encryption is as strong as we claim it to be, email us a sample script. We'll encrypt it for you and provide you with the encrypted copy. You can then test it out and see if you can crack it. Take your time. Give it to the most experienced hackers you know. Let them take a stab at it. If they can't get to the source code, well, there goes your answer.

Yes, it is very easy to do. The Menu Driven Shell Script Encryption Automation that comes with our Enterprise encryption packages, is designed to shield customers from the very technical aspect of the encryption and obfuscation process.

Through the menu driven interface, you can choose to encrypt multiple scripts specified in either a list file or a directory of scripts. The encrypted scripts will be packaged into one zip file or tar file, which you can then give to your customers.

When your customer receives the zip or tar file, all that they'll need to do is unzip or untar the package, and run one simple script to set up the encrypted scripts enclosed in it.
If you intend to purchase a license, simply shoot us an email with one or two sample scripts. We'll encrypt them for you and will send you the encrypted copies so you can test them and verify they work exactly as the originals.

Yes. Along with other security measures, we allow users to specify how long a script is to be valid for. After the user specified date, the script will no longer function. If you do not wish for an encrypted script to expire, simply specify 7000d for the expiration. 7000d equals approximately 19+ years, which in the IT world is basically a lifetime!
  1. Protect sensitive information and intellectual property
  2. Eliminate the ability of others to keep tabs on you, if you work in a lab-like environment where everyone has root access
      - Our encryption tool ensures even those with root privileges cant view your scripts
  3. Hide passwords that you don't want to make easy for anyone to have access to
  4. Sell your scripts to a third party without giving away any proprietary information
  5. Get alert notifications - Create clandestine records of all attempts of theft by users of your scripts
      - Our encryption tool ensures even those with root privileges cant view your scripts
      • Every single script that is obfuscated and encrypted by is protected under the premise that those who run the scripts are simply to run it. When a user of an encrypted script tries to break it apart to see how it works, a record of the attempt will be logged.
        • - This record can then be used (by the script owner) as evidence in a court of law if necessary.
Yes. We can encrypt Shell Scripts, Perl Scripts, Ruby Scripts, Python Scripts, Command line NodeJs and PHP Scripts and RScripts (rcode).
All scripts that are encrypted through either the 'Upload' or 'Copy and Paste' options provided on the home page are valid for about 24 hours.

To extend the expiration date of your scripts beyond a few hours, you'll need to purchase a licensed standalone version of the encryption tool of your choice.

Flexible License Terms:

With any of the 5 different licensing options we have available, you can get the exact Encryption software you need for as long as you need it without making a big up-front investment. You can choose to only make a payment when you need the tool.
You can:

Purchase and download your own personalized (and encrypted) version of our Encryption tool
  • This option will enable you to avoid submitting any extremely sensitive scripts to our website
    • It allows you to encrypt as many scripts as you need, right from your own private host.

Contact us at [ ] for more information or other options.
Here are your realistic options:

  1. Rely on permissions/ownership as your only means of protection
  2. Use an open-source obfuscation method - which makes your scripts more likely to be successfully hacked!
  3. Or use our unique, always-evolving encryption algorithm that ensures no one can unveil your protected code
Yes. However, currently, we can only encrypt standalone nodejs scripts - meaning, all the values your nodejs script needs to run must be hard-coded in the script already. The nodejs script should not be accepting any input from users. If your script must accept arguments, make it read from a config file instead, a config file that the person running the script would have to update.

We are currently working on a process that will allow for the direct passing of arguments and parameters to an encrypted nodejs script. As of this writing (December 22, 2017), that project is still in progress.
There are quite a number of different ways a determined hacker can take to attempt to hack a protected script. One of such ways is altering the binary files of the programming language your script is written in. is aware of these types of tactics and steps have been taken to combat them effectively.

Whenever an protected script is run on any Unix system, it does a variety of checks simulteneously. These checks confirm the validity of all necessary tools needed to run the protected script. If the algorithm senses any of the critical tools it needs have been tampered with or simply aren't in the state it expects them to be in, it will refuse to run the protected script and will abort immediately.

If you're not trying to hack the script, or figure out how our algorithm works, feel free to shoot us an email. In your email, please provide a copy and paste of the exact error messages you encountered and the name of Unix OS your script was run on.
Yes. Your encrypted scripts can run under Android systems. During encryption of the scripts, simply specify "android-rb" instead of "autogenerate" at the command line. To run an encrypted script on an android machine, you can utilize the apps known as "Terminal Emulator" and/or "Root Browser".