The AxCrypt Command Line Interface (CLI) is a free, open-source tool that allows you to encrypt and decrypt files directly from your terminal or command prompt.
Command Syntax Overview
AxCryptCli --[command] [arg1 arg2 arg3 ...]
Where:
AxCryptCli → The program name that performs file encryption or decryption
--[command] → The operation to be performed (e.g., )
[args] → Inputs required by the command, such as file paths
Setting the Password
Before running any encryption or decryption operation, you must provide a passphrase.
Syntax
--passphrase [password]
Full Command Example
AxCryptCli --passphrase fileSecret
This sets the password for the operations that follow.
Encrypting Files
To encrypt one or more files, use the command.
Syntax
--encrypt [file1 file2 file3 ... fileN]
Full Command Example
AxCryptCli --passphrase fileSecret --encrypt C:\Docs\file.docx
Each file must be referenced using its full file path.
After encryption, the output file will have the extension.
Decrypting Files
To decrypt encrypted files, use the command.
Syntax
--decrypt [file1 file2 file3 ... fileN]
Full Command Example
AxCryptCli --passphrase fileSecret --encrypt C:\Docs\file.docx
You must use the same passphrase that was used during encryption.
Command Line Interface (CLI) ideal for:
Quick one-off encryption and decryption
Automating routine file-protection tasks using scripts
Environments where GUI tools are not available
The AxCrypt CLI does not require an account or sign-in. You only need to supply a password to perform secure 128-bit AES encryption or decryption.
Currently, the CLI supports two core operations:
Encrypt
Decrypt
Note:
You can encrypt or decrypt multiple files in one command by listing them all after the command.
Ideal for scripts (PowerShell, Bash, batch files) for automated protection workflows.
You do not need to register or create an AxCrypt account to be able to use Axcrypt CLI.
How the Command Line Works
A command line is a text-based interface that allows you to interact with your computer by typing commands instead of clicking buttons. A password is required for both encryption and decryption.
It’s commonly used by developers, system administrators, and power users because it’s fast, precise, and ideal for automation.
1. You type a command
A command is a line of text that tells the computer what action you want it to perform.
Example:
AxCryptCli --encrypt C:\Docs\file.docx
2. The command line reads and interprets what you typed
The command line (Command Prompt, PowerShell, or Terminal) breaks your input into:
Program name (the tool you want to run)
Commands or switches (what you want that tool to do)
Arguments (additional information like file paths)
Example breakdown:
AxCryptCli → program--encrypt → command/switchC:\Docs\file.docx → argument/file path
3. The program executes your instruction
Once interpreted, the command is passed to the program (in this case, AxCryptCli).
The program then performs the action — such as encrypting, decrypting, copying, moving, or creating files
For AxCrypt CLI, that action is usually:
Encrypting a file
Decrypting a file
4. The program returns output
After processing the command, the program usually displays the result in the terminal.
Example:
“File encrypted successfully”
“Incorrect passphrase”
“File not found”
No message at all (if it executed silently)
Some command-line tools also create new files (like AxCrypt creating .axx encrypted files).
5. You can chain commands or automate them
Command line tools can be placed inside:
Batch files (.bat)
PowerShell scripts (.ps1)
Bash scripts (.sh)
Cron jobs / scheduled tasks
This makes repetitive tasks automatic and efficient.
Example of automating encryption daily:
AxCryptCli --passphrase mySecret --encrypt C:\Backups\*.txt












