ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones.
Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile.
See the features below.

It works as a "proxy" for the ImDisk Virtual Disk Driver. The latter is included in the full package and does not require installation.

See the documentation for more informations and an example of use:
https://sourceforge.net/p/proxycrypt/doc/

Password for extracting 32-bit builds is: proxycrypt

Requirements:
- Windows XP, Vista, 7, 8, 8.1,10 or 11
- ImDisk Virtual Disk Driver or Arsenal Image Mounter
- Administrative privileges
- CPU with SSE2 instructions
- About 140 MB of RAM temporarily required for password checking with default settings

Hashes of all versions:
https://sourceforge.net/p/proxycrypt/doc/Hash

Features

  • Supports AES-256, Serpent and SHACAL-2 ciphers.
  • Cascade encryption with free choice of the ciphers.
  • Supports key files, in conjunction or replacement of the password.
  • Mode of operation is XTS.
  • Passwords are hashed with the scrypt key derivation function, which uses Whirlpool or Keccak-512 hashing function.
  • Scrypt can be tuned for more security or more speed.
  • Password length can be up to 250 characters.
  • Protection against keyloggers.
  • Supports image files or physical drives with MBR (with extended partition) or GPT.
  • Encrypted volumes can be created at any location, not necessarily at the beginning of a file or a partition.
  • Auto-dismount after a specified period of inactivity or when system enters a suspended state.
  • NTFS folders can be used as mount point instead of drive letters.
  • Supports very long paths of image file (more than 260 characters).
  • Performances improved with AES instructions, SSE2 optimizations and asynchronous read/write.
  • Available in 32 and 64-bit with distinct AVX versions.

Project Samples

Project Activity

See All Activity >

License

Public Domain

Follow ProxyCrypt

ProxyCrypt Web Site

You Might Also Like
Total Network Visibility for Network Engineers and IT Managers Icon
Total Network Visibility for Network Engineers and IT Managers

Network monitoring and troubleshooting is hard. TotalView makes it easy.

This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of ProxyCrypt!

Additional Project Details

Operating Systems

Windows

Intended Audience

Advanced End Users, Security Professionals, Security

User Interface

Command-line

Programming Language

C

Related Categories

C Cryptography Software, C Command Line Tools, C Decryption Software

Registered

2016-07-07