Here we Will be using The "myfiles" as the directory that all the codes will run on dealing with the files inside, and add your secrets as "API_KEY" and "Chat_ID"
-
The "main.py" here controls the "encrypt_all.py" (which is explained later on) by a telegram bot, you can use the /help command to get a list of commands.
-
First There's The "encrypt_all.py":
- It has the encrypt() and decrypt() functions.
-
It Converts Every File of any type that's present inside the myfiles folder to a ".mortex" file which is a simple encrypted file it can be reversed using the "decrypt()" function.
-
It Creats a key and stores it in the "key_all.mortkey" to be used to decrypt.
- Then There's The "encrypt_text.py" and "decrypt_text.py" :
- They Only Convert The Text Files inside the myfiles folder into encrypted files.
- They Generate The "key_text.mortkey" file that contains the key that will be used to decrypt the Text Files.
- The decrypt_text.py will return the text files to their normal state using the key.
-
Then There's The "img_encrypt.py" and the "img_decrypt.py" :
-
They Convert The Png image inside the myfiles fodler into an ecrypted image by converting it to a .mortex file then getting the text, encrypting it and returning in the file then convert it back to a Png and to decrypt it does exactly the reverse of this.
-
It creats a key and stores it inside the "key_img.mortkey" to be used to decrypt the image again.
- It has the encrypt() and decrypt() functions.
- It Converts Every File of any type that's present inside the myfiles folder to a ".mortex" file which is a simple encrypted file it can be reversed using the "decrypt()" function.
- It Creats a key and stores it in the "key_all.mortkey" to be used to decrypt.
- They Only Convert The Text Files inside the myfiles folder into encrypted files.
- They Generate The "key_text.mortkey" file that contains the key that will be used to decrypt the Text Files.
- The decrypt_text.py will return the text files to their normal state using the key.
- They Convert The Png image inside the myfiles fodler into an ecrypted image by converting it to a .mortex file then getting the text, encrypting it and returning in the file then convert it back to a Png and to decrypt it does exactly the reverse of this.
- It creats a key and stores it inside the "key_img.mortkey" to be used to decrypt the image again.