Home > Softwares > Batch Unpack / Extract Password Protected Archives (zip, rar & 7z) using ExtractItAll

Batch Unpack / Extract Password Protected Archives (zip, rar & 7z) using ExtractItAll

by Shivaranjan on November 4, 2009

ADVERTISEMENTS

ExtractItAll is a freeware utility using which you can batch extract / unpack multiple password protected archives using a list of passwords. This tool can also be used to extract archives which are not password protected, these days huge files in rapidshare and other file sharing sites are stored in multiple parts. A 700MB file will be stored in 7 parts of 100MB each with file names file.rar, file.r01 .. file.rn etc so this tool also extracts files of those type as well.

extractitall-1

(click to enlarge the image)

To extract files just drag and drop the files that needs to be extracted and hit the ‘Start’ button at the bottom of the screen to start the extraction.

extractitall-2

(click to enlarge the image)

To extract the password protected files add the passwords and the program will save it, when the password protected files are being extracted password would be applied to extract the file.

extractitall-3

(click to enlarge the image)

The program provides two options for selecting the extraction destination, use the dynamic subdirectory when you want to the extract the files within the source directory and use fixed directory to choose the directory of your choice.

The program supports the following file types:

  1. * 7-Zip  ( *.7z )
  2. * Rar ( *.rar | *.r00, *.r01, … | *.part1.rar , *.part01.rar , … )
  3. * Zip ( *.zip )

This program does not require any installation hence can be used as a portable application. To run this application you will require .Net Framework 3.5 installed in your Windows pc.

Download ExtractItAll

Did you enjoy this article? Please subscribe to RSS Feed to receive all the updates!

Related Posts:

{ 1 comment… read it below or add one }

Massimo Villa May 24, 2013 at 10:57 pm

Great tool, thanks for sharing.

Leave a Comment

Previous post:

Next post: