Cybersecurity Reference - Interactive Toolkit - Practice Hub
| Char | Encoded |
|---|---|
| space | %20 |
| " | %22 |
| % | %25 |
| < | %3C |
| > | %3E |
| \ | %5C |
| { | %7B |
| } | %7D |
| | | %7C |
| ~ | %7E |
| Char | Entity |
|---|---|
| & | & |
| < | < |
| > | > |
| " | " |
| ' | ' |
| Val | Char | Val | Char |
|---|---|---|---|
| 0 | A | 26 | a |
| 25 | Z | 51 | z |
| 52 | 0 | 61 | 9 |
| 62 | + | 63 | / |
| Base64URL: + ? - and / ? _ | |||
| Property | Symmetric | Asymmetric |
|---|---|---|
| Keys | 1 shared key | Key pair (public + private) |
| Speed | Fast | Slow |
| Key Size | 128-256 bits | 2048-4096 bits |
| Examples | AES, DES, Blowfish | RSA, ECC, DSA |
| Algorithm | Output | Status |
|---|---|---|
| MD5 | 16 bytes (128 bit) | Broken |
| SHA1 | 20 bytes (160 bit) | Broken |
| SHA256 | 32 bytes (256 bit) | Safe |
| bcrypt | 60 chars | Recommended |
MD5: 32 hex chars
SHA1: 40 hex chars
SHA256: 64 hex chars
SHA512: 128 hex chars
bcrypt: starts with $2y$ or $2a$
TXkgRmlyc3QgQmFzZTY0IERlY29kZQo=
&?e22084c2ca255918f9f9c755e06e9dbe7cdf13f0635bdcafaa6dbc8ba963c25b
Beginner-friendly cybersecurity training platform.
Challenging machines and challenges for all skill levels.
The "Swiss Army Knife" of data transformation.
OWASP, PortSwigger, Microsoft, Auth0, Hydra, and TryHackMe practice.
OWASP, MDN, and PortSwigger references for session management.
Hands-on labs for username enumeration, 2FA bypass, and timing attacks.