Cybersecurity Reference · Interactive Toolkit · Practice Hub
| Char | Encoded |
|---|---|
| space | %20 |
| " | %22 |
| % | %25 |
| < | %3C |
| > | %3E |
| \ | %5C |
| { | %7B |
| } | %7D |
| | | %7C |
| ~ | %7E |
| Char | Entity |
|---|---|
| & | & |
| < | < |
| > | > |
| " | " |
| ' | ' |
| Val | Char | Val | Char |
|---|---|---|---|
| 0 | A | 26 | a |
| 25 | Z | 51 | z |
| 52 | 0 | 61 | 9 |
| 62 | + | 63 | / |
| Base64URL: + → - and / → _ | |||
| Property | Symmetric | Asymmetric |
|---|---|---|
| Keys | 1 shared key | Key pair (public + private) |
| Speed | Fast | Slow |
| Key Size | 128–256 bits | 2048–4096 bits |
| Examples | AES, DES, Blowfish | RSA, ECC, DSA |
| Use Case | Bulk data encryption | Key exchange, signatures |
| Key Distribution | Hard (must share secretly) | Easy (public key is shareable) |
| Mode | Description | Security |
|---|---|---|
| ECB | Each block encrypted independently | ⚠ Insecure |
| CBC | XORs each block with previous ciphertext | OK with HMAC |
| CTR | Turns block cipher into stream cipher | Good |
| GCM | CTR + authentication tag | Best practice |
| Prefix | Algorithm |
|---|---|
| $1$ | md5crypt (Cisco, old Linux) |
| $2$/$2a$/$2b$/$2y$ | Bcrypt |
| $5$ | sha256crypt |
| $6$ | sha512crypt (default Linux) |
| Algorithm | Output | Status |
|---|---|---|
| MD5 | 16 bytes (128 bit) | Broken |
| SHA1 | 20 bytes (160 bit) | Broken |
| SHA256 | 32 bytes (256 bit) | Safe |
| SHA512 | 64 bytes (512 bit) | Safe |
| bcrypt | 60 chars | Recommended |
| NTLM | 16 bytes (MD4) | Weak |
| OS | Location |
|---|---|
| Linux | /etc/shadow (root only) |
| Windows | SAM (NTLM/LM hashes) |
| macOS | /var/db/dslocal/nodes/Default |
MD5: 32 hex chars (e10adc3949ba59abbe56e057f20f883e)
SHA1: 40 hex chars
SHA256: 64 hex chars
SHA512: 128 hex chars
bcrypt: starts with $2y$ or $2a$
MySQL: 16 hex chars or 41 chars with *
A special case of Caesar cipher with shift 13. Applying it twice returns the original text. Not secure — only obscures text.
Uses the Web Crypto API. All computation runs locally in your browser.
XOR is its own inverse: XOR encrypt and XOR decrypt are the same operation. Fundamental building block of many ciphers.
TXkgRmlyc3QgQmFzZTY0IERlY29kZQo=&?XRPCTCRGNEI — it was encrypted with Caesar Cipher. What's the plaintext?e22084c2ca255918f9f9c755e06e9dbe7cdf13f0635bdcafaa6dbc8ba963c25bBeginner-friendly cybersecurity training platform with guided rooms and learning paths.
Challenging machines and challenges for all skill levels. Great for practical hacking experience.
Dedicated cryptography challenges. Learn by solving puzzles in modular arithmetic, AES, RSA, and more.
CMU's beginner-friendly CTF competition. Great intro to cybersecurity challenges and CTF format.
Wargames to learn security concepts. Start with Bandit for Linux fundamentals and privilege escalation.
French-based platform with 400+ challenges across steganography, crypto, web, forensics, and more.
The "Swiss Army Knife" of data transformation. Encode, decode, encrypt, hash, analyze — all in one.
Free online hash cracking using precomputed rainbow tables. Supports MD5, SHA1, SHA256, and more.
Online hash decryption service. Supports many hash types with a large database of pre-cracked hashes.
Auto-identify cipher types. Paste ciphertext and it suggests likely encryption/encoding methods used.
World's fastest password recovery tool. GPU-accelerated. Supports 300+ hash types.
Popular CPU-based password cracker. Works great in VMs. Detects hash types automatically.
Clear comparison article explaining the differences.
In-depth blog post with practical examples.
How attackers use encoding to bypass security filters.
Visual comparison with code examples.
Mozilla's official documentation on Base64 encoding.
Attacks and defenses explained in detail.
Comprehensive collection of wordlists, passwords, fuzzing payloads, and more. Essential for any pentester.
14M+ passwords from the RockYou breach. The most commonly used password cracking wordlist.
Network protocol analyzer. Inspect TLS handshakes, certificates, and encrypted traffic patterns.
Web security testing toolkit. Intercept and manipulate encoded/encrypted data in transit.
Understand where crypto failures fit in common web vulnerabilities (A02: Cryptographic Failures).
Search for known cryptographic vulnerabilities in software products and libraries.