____ ____ _
| _ \ | _ \ | | 🌍: https://icodexys.net
| | | || |_) |_ | | 🛠️: https://github.com/jheffat/DPJ
| |_| || __/| |_| | 📊: 3.6.0 (06/07/2025)
|____/ |_| \___/
**DATA PROTECTION JHEFF**, a Cryptographic Software.
DPJ is a command-line data encryption tool, an improvement of Fixor 2.50(Discontinued). The Name Fixor changed to DPJ in honor of the my first encryption tool developed in QBasic and Visual Basic (2003–2007), DPJ is faster, AES-Like secure, and packed with new features designed to keep your data safe. Is a lightweight CLI tool, encrypt/decrypt files securely using custom-built methods. Good tool to encrypt your work projects or your sensitive data(documents, PDFs, photos, videos, etc.). -->✨ Changelog
The original name, Fixor, was chosen because the first version of the tool used only XOR-based encryption with a fixed key in 2021. As the project evolved to include more advanced cryptographic mechanisms, the name no longer reflected its capabilities.
DPJ has a deeper significance: it was the name of my first encryption tool DPJ Basic, created in 2001 with QBASIC(CLI), later in 2005 with VB(GUI). Bringing the name back honors that origin while also marking the maturity of this version.
This release marks a turning point — DPJ is no longer a simple XOR tool, but a full encryption system with real IV, linear & nonlinear complexity...
- 🔒 Fast Encrypt & Decrypt Files, using custom-built encryption.
- ✳️ Secure password input with masking (hidden as you type).
- 🌀 Nonlinear Transformation Support, Integrated AES-like S-box, P-box, XOR mixing & byte inversion. Improves resistance to differential and linear cryptanalysis.
- ⚡ IV Support, Uses a cryptographically secure IV to ensure ciphertext uniqueness, even with the same key and plaintext.
- 🧠 Choose or Autogenerate Passphrase, for encryption
- 🚫 No Overwrites, a file will not be altered if the provided passphrase is incorrect. DPJ detects if a file is encrypted and prevents redundant encryption.
- 🔐 KDF Support, Passphrases are transformed via a
Key Derivation Functionbefore use, making brute-force attempts extremely difficult. - 🔑 Key Schedule Support, a process that expands the main encryption key(KDF) into multiple round keys used throughout the encryption rounds to enhance security.
- 🧂 Secure Password Hashing, stored in encrypted metadata
- 🧬 Encrypted Metadata with AES, Used to protect internal config
- 🔍 File Scan Mode, to check encryption details
- ✅ Integrity Check Passed, A SHA-256-based verification step checks whether the decrypted data matches the original, ensuring the decryption process was successful.
- 🛡️ HMAC Support, A SHA-256-based HMAC is generated during encryption and verified during decryption to detect tampering or corruption.
- #️⃣ Hash tools included, Hash files/Msg using any theses algorithms (blake2b, sha3_512, sha256, sha1, sha512, shake_128, shake_256, sha3_256, blake2s, md5), In the absence of a specified algorithm, the default SHA256 will be applied.
I’m using a custom-built encryption scheme that applies multilayer linear and nonlinear transformations. Many of these layers are inspired by real-world cryptographic algorithms such as AES (see more in CHANGELOG.md). For now, this option is intended for educational purposes only until it can be professionally reviewed. I’m currently rebuilding DPJ to support AES encryption as a second option, offering a more secure and reliable method widely used in both industry and cybercrime. The reason I built this tool from scratch(without relying on external modules) is to deepen my understanding of how encryption works, enhance my learning, and improve my problem-solving skills.
DPJ improves on Fixor with significantly faster encryption and decryption processes, optimized for modern systems and large files.
DPJ is an encryption tool intended for responsible use. By using this software, you acknowledge and accept the following:
-You are solely responsible for managing your passwords, keys, and encrypted data.
-If you lose or forget your passphrase, there is no way to recover your data. This is by design, as DPJ does not store or transmit any recovery information.
-The author(s) of DPJ are not liable for any data loss, damage, or consequences resulting from misuse, forgotten credentials, or failure to follow best security practices.
Use at your own risk.
You can install DPJ,
++by cloning this repo:
git clone https://github.com/jheffat/dpj.git
cd dpj
python3 -m pip install++by using pypi pypi.org/dpj... or:
pip install dpj++By download and install executable for:
*Windows
DPJ 3.6.0 Installer.exe (Need to setup your anti-virus to allow using this app)
*Linux Debian
DPJ_360LinuxDeb.deb (Link Dead**Fixing...)
sudo dpkg -i DPJ_353LinuxDeb.debEncrypt all files including sub-directories with a key #R3ds0ftwar3!len3zz
dpj -e *.* -r -k #R3ds0ftwar3!len3zz Encrypt all files with the extension .JPG on the current path c:\pictures
dpj -e c:\pictures\*.jpg Decrypt all files including in sub-directories on the current local
dpj -d *.* -r scan all files including in sub-directories on the current local
dpj -s *.* -r Hash all files using all algorithms
dpj -hs *.* -a allHash a text using md5
dpj -hs 'Life is Good' -a md5List of Files ready to be encrypted
Encryption Process
Decryption Process
Scanning files encrypted
Hashing a file
Hashing a file with all algorithms
Hashing all files using only the algorithm SHA256

This project is licensed under the MIT License - see the LICENSE file for details.
DPJ(Data protection Jeff), was my first encryption app crafted in QBasic(CLI) and Visual Basic(GUI) between 2001–2007. This project is a modern revival with more power, speed, and security, thanks to language PYTHON.