Running Kryptor

Windows

  1. Navigate to the location of the downloaded .zip file (e.g. the Downloads folder).

  2. Right click the .zip file and select Extract All.

  3. Cut and paste (Ctrl + X) the kryptor.exe file into %USERPROFILE%, which can be accessed by searching %USERPROFILE% in the taskbar.

  4. Open the Command Prompt (e.g. search for cmd in the taskbar).

  5. Type kryptor -h for a list of commands and some examples.

Don't move the executable into a directory that requires administrator privileges.

Linux

  1. Open the terminal (e.g. search your programs for terminal) and navigate to the path of the downloaded .zip file (e.g. cd Downloads).

  2. Type unzip [file].zip.

  3. Navigate to the extracted folder (e.g. cd kryptor-linux-x64).

  4. Mark the kryptor file as executable using chmod +x kryptor.

  5. Move the kryptor executable to the /home directory using mv kryptor /home.

  6. Type ./kryptor -h for a list of commands and some examples.

Don't move the executable into a directory that requires root privileges.

macOS

  1. Open Finder and navigate to the location of the downloaded .zip file (e.g. Downloads/kryptor-macos-x64.zip).

  2. Double click the .zip file to extract it.

  3. Open the Terminal (e.g. search your programs for Terminal) and navigate to the path of the extracted folder (e.g. cd Downloads/kryptor-macos-x64).

  4. Mark the kryptor file as executable using chmod +x kryptor.

  5. Move the kryptor executable to the /Users/USERNAME directory, replacing USERNAME with your user account name, which is shown before the @ symbol on the far left of the terminal (e.g. mv kryptor /Users/samuellucas).

  6. Type cd to return to your user directory.

  7. Then type ./kryptor -h for a list of commands and some examples.

  8. macOS will give a warning that Apple couldn't verify the file since it hasn't been signed. Click Done, open System Settings, go to Privacy & Security, scroll down, and click the Allow Anyway button.

  9. Run ./kryptor -h again and click Open Anyway when another popup appears. This will ask you to authenticate (e.g. with Touch ID). Then the application will be saved as an exception to your security settings and can be run without any further popups.

See this article for more information on Gatekeeper in macOS, which blocks unidentified software from running to protect against malware.

Don't move the executable into a directory that requires root privileges.

Last updated