Free PDF Unlock Online

Remove passwords from encrypted PDFs in seconds. Instant processing, no sign-up required.

Your files never leave your device
Drop your PDF here or click to browse

Password-protected PDFs only · up to 100 MB

How It Works

  1. Upload your password-protected PDF using the drop zone above.
  2. Enter the PDF's password in the password field.
  3. Click "Unlock PDF" to decrypt and remove the password.
  4. Download your unlocked PDF instantly · processed entirely in your browser.

Why Unlock PDFs?

Password-protected PDFs can be inconvenient if you forget the password, receive a locked file from a colleague, or need to process files in bulk. Unlocking removes the password restriction so you can open the PDF freely, share it without password sharing, or use it in automated workflows. This is completely safe and legal when you have authorization to access the PDF.

Security & Privacy

Frequently Asked Questions

How long does unlocking take?

Unlocking is nearly instant. Most PDFs process in under a second. Larger files may take a few seconds depending on your device's processing power.

Is there a file size limit?

PDFs can be up to 100 MB. Since processing happens locally in your browser, very large files may take longer depending on your device.

Is this legal?

Yes, unlocking a PDF you own or have permission to access is completely legal. This tool is intended for PDFs you created or have authorization to modify. Never unlock PDFs belonging to others without their permission.

Does the unlocked PDF look different?

No. The unlocked PDF is identical to the original except the password protection is removed. Content, layout, images, and formatting remain exactly the same.

What if I forget the password?

Unfortunately, if the PDF is encrypted with a strong password you don't know, there's no way to unlock it. Password-protected PDFs use encryption that cannot be bypassed without the correct password.

What "PDF unlock" actually means

The phrase "PDF unlock" covers two genuinely different operations that the PDF specification treats separately, although end users rarely distinguish them. The first is removing an open password (also called a user password or document-open password). A PDF with an open password is encrypted at the storage level: the page content, font resources, and embedded images are stored as ciphertext on disk, and no PDF reader can render the page without first decrypting the streams using a key derived from the password. Unlocking this kind of PDF requires the correct password. There is no way around the mathematics; the encryption is real, and the key is derived from the password through a one-way function.

The second is removing a permissions password (also called an owner password or restriction password). A PDF with a permissions password is technically still encrypted, but the open-document operation does not need the password: any PDF reader can render the file. What the permissions password protects is the set of operations the reader is permitted to perform, encoded in a 32-bit field called P. Specific bits in P govern printing, copying text, modifying content, filling forms, extracting content for accessibility, and so on. Removing a permissions password means rewriting the document with all P-bits set to 1 and discarding the encryption layer. No password input is required for that case. This tool handles both: supply the open password to remove both layers, or leave the field blank if the PDF only has a permissions password.

How this tool works

This tool uses qpdf, a structural PDF toolkit written in C++ by Jay Berkenbilt and maintained as open source since 2008. qpdf is the reference implementation of PDF structural operations and is used as a building block by most other open-source PDF utilities, including Ghostscript, PDFtk, and the standard Linux command-line PDF tools. A number of server-side commercial PDF services use qpdf under the hood as well, sometimes without acknowledging it. qpdf implements the standard security handler (Filter /Standard) defined in the PDF specification, which covers every password-based encryption scheme from RC4 40-bit (PDF 1.1, 1994) through AES-256 V=5/R=6 (PDF 2.0, current).

qpdf is compiled to WebAssembly through Emscripten, producing a single roughly 1.3 megabyte module that runs inside this browser tab. The module is downloaded once on first visit and cached by the browser; subsequent visits load instantly. When you select a PDF, the browser File API hands the bytes directly to the qpdf WASM module running in the JavaScript engine. The module parses the encryption dictionary, prompts for the password if needed, decrypts every encrypted stream and string, removes the Encrypt entry from the trailer, rewrites the cross-reference table, and returns the unlocked bytes back to the page as a Blob. No network request fires during the unlock. You can verify it: open the browser developer tools to the Network tab before clicking Unlock, run the operation, and observe that nothing leaves your machine.

PDF encryption, 1994 to 2026

PDF encryption has been a moving target since the format was introduced in 1993. Each major specification revision added a new algorithm or fixed a key-derivation flaw in the previous one. The algorithm in use determines what the unlock operation is doing under the hood; qpdf recognises all of them and dispatches to the right implementation. The encryption dictionary's V field (algorithm version, 1 to 5) and R field (revision of the standard handler, 2 to 6) identify the scheme.

User password versus owner password

The PDF specification calls these the "user password" and the "owner password." Most consumer-facing tools call them the "open password" and the "permissions password," which is more descriptive. A user password is the one you type to open the file in a reader. The document's content streams are encrypted with a key derived from this password, so the file is unreadable without it. The encryption is real: PDFs with strong user passwords resist any known attack short of exhaustive search through the password keyspace, which is computationally infeasible for passwords longer than about ten random characters.

An owner password is different. The document is still encrypted, but the open-document operation succeeds without any password input; any PDF reader can render the file. What the owner password protects is the set of operations the reader is permitted to perform, encoded in the 32-bit P field of the encryption dictionary. Bits in P govern printing, copying text, modifying content, filling forms, extracting for accessibility, and assembling pages. Honourable PDF readers respect these bits even when the user lacks the owner password; less honourable ones ignore them. The unlock operation removes both layers: it decrypts the streams and discards the P field, producing an output PDF with no restrictions of any kind.

Real-world workflows that drive PDF unlock

Common pitfalls and what they mean

Browser-only versus cloud unlock

The cloud PDF-unlock services that fill the top of search results (Smallpdf, ILovePDF, PDF24 web, Adobe Acrobat Online, Sejda) all upload your password-protected PDF to their servers along with your password, decrypt the file server-side, and serve the unlocked copy as a download. The privacy implications differ from a normal file upload in two important ways. First, the password itself transits the operator's network and exists briefly in operator logs and memory. Second, the operator now holds both the encrypted file and the decryption key, so even users comfortable with "they have my encrypted file" implicitly accept "they have my decrypted file too" with cloud unlock. The major operators publish privacy policies committing to deletion within hours and TLS in transit, and they have strong commercial reasons to comply, but "deletion within hours" is not "never seen."

This tool does not upload the file or the password. The qpdf WASM module runs in your browser tab, receives the file bytes through the File API and the password through a standard HTML input, and returns the decrypted bytes back to the same tab. You can prove it: open the browser developer tools to the Network tab before clicking Unlock, run the operation, and observe that no requests are made with your file or password content. The trade-off is feature scope. Cloud services often offer "password recovery" alongside "password removal," running distributed brute-force or dictionary attacks on server farms to guess unknown passwords. Browser-side cracking is many orders of magnitude slower than GPU-accelerated server-side cracking, so password recovery is not in scope for a browser tool. If you do not know the password and the PDF was encrypted with a strong algorithm, the realistic options are desktop cracking with hashcat (formats 10500, 10600, 10700) or John the Ripper's pdf2john extractor, and accepting that strong passwords are designed to be unrecoverable.

More frequently asked questions

Which encryption algorithms does this tool support?

All standard PDF encryption defined by the specification: RC4 40-bit (V=1, R=2), RC4 128-bit (V=2, R=3), AES-128 (V=4, R=4), the original AES-256 from Acrobat 9 (V=5, R=5), and the corrected AES-256 from ISO 32000-2 (V=5, R=6). Non-standard schemes (FileOpen, Adobe LiveCycle, certificate-based public-key encryption) are not supported and need specialised software from the relevant vendor.

Can this tool recover a forgotten password?

No. The tool needs the correct password as input; it does not attempt to guess. For password recovery, the right options are the open-source pdf2john extractor with John the Ripper, hashcat with format -m 10500 (V=2, R=3), -m 10600 (V=4, R=4), or -m 10700 (V=5, R=6), or commercial password-recovery services that run GPU farms for hire. Strong passwords (long, mixed character classes, random) are designed to be unrecoverable in practical time.

What about FileOpen, Adobe LiveCycle, or certificate-based protection?

Not supported. These are specialised DRM schemes that use a custom Filter rather than the standard security handler. FileOpen and LiveCycle require the vendor's tooling. Certificate-based public-key encryption uses a recipient's private key rather than a password; if you have the key, Adobe Acrobat or a desktop PDF library with public-key handler support is the right tool.

Will the unlocked PDF look and behave the same as the original?

Yes for content, layout, fonts, images, formatting, and form data. The only structural differences are that the encryption dictionary is removed from the trailer and the cross-reference table is rewritten as part of the decryption pass. File size typically changes by less than one percent. Digital signatures attached to the original become invalid because the document bytes change, which is the only behavioural difference.

Can I unlock and then re-encrypt with a stronger password?

Yes. Unlock here, then run the unlocked PDF through the PDF Protect tool to apply a new password with AES-256 V=5/R=6. This is the standard workflow for migrating legacy PDFs from RC4 (which offers little real protection in 2026) to current AES-256, and for replacing a shared organisational password with a fresh one.

Is there a desktop or command-line equivalent?

qpdf itself runs on every platform: brew install qpdf on macOS, apt install qpdf on Debian or Ubuntu, downloadable binaries from the qpdf GitHub for Windows. The CLI syntax for an unlock is qpdf --decrypt --password=YOURPASSWORD input.pdf output.pdf. Same library, same privacy posture as this tool, and useful for batch processing through shell loops.

Related Tools