Comment on page
Crypto
Address | Explanation |
---|---|
https://www.dcode.fr/ | encryption and decryption |
https://crackstation.net/ | Decoding |
https://gchq.github.io/CyberChef/ | encryption and decryption and … |
https://www.base64encode.org/ | base64 encoding |
https://www.base64decode.org/ | base64 decoding |
http://rumkin.com/tools/cipher/caesar.php | Decode caesar |
https://www.unphp.net | deobfuscate php code |
https://asecuritysite.com/encryption/ferdecode
Or
from cryptography.fernet import Fernet
key = ""
token = ""
cipher = Fernet(key)
decoded = cipher.decrypt(token)
http://www.malbolge.doleczek.pl/
https://zb3.me/malbolge-tools/
https://www.geocachingtoolbox.com/index.php?lang=en&page=dvorakKeyboard
http://dl.djsoft.net/DTMFChecker.zip
https://www.dcode.fr/prime-numbers-cipher
git clone https://github.com/BREAKTEAM/Debcrypt.git
python3 crack.py
https://www.dcode.fr/cistercian-numbers
https://www.dcode.fr/code-multitap-abc
http://rumkin.com/tools/cipher/atbash.php
python3 crack_repeating_key_xor.py -f <file> -x
https://programtalk.com/vs2/python/9053/featherduster/tests/test_bleichenbacher.py/
For example, decryption of flag.enc file by public key without private key
python3 ./RsaCtfTool/RsaCtfTool.py --publickey ./key.pub --private
openssl rsautl -decrypt -inkey key.pri -in flag.enc -out flag.txt
https://www.dcode.fr/vigenere-cipher
echo "YToxOntzOjQ6Im5hbWUiO2E6MTp7czoxMDoicGF1bC1jb2xlcyI7YTo5OntzOjI6ImlkIjtzOjEwOiIxNTkyNDgzMjM2IjtzOjQ6Im5hbWUiO3M6 | base64 -d
Last modified 1mo ago