Cryptography
Number Bases Converters and Translators
Cipher Identification and Decryption Tools
dCode
dCode.fr is a collection of hundreds of tools to help solve ciphers, codes, puzzles, etc. Check out the online dCode Cipher Identifier if you’re not sure how a message is encrypted. Or check out the list of all available dCode tools.
Commonly used dCode cipher tools:
- Caesar Cipher
- Substitution cipher: letters in the alphabet are shifted by some fixed number of spaces to yield an encoding alphabet.
- Morse Code Translator
- Encodes text characters as sequences of two different signal durations, called dots and dashes (or dits and dahs).
- Example:
.... . .-.. .-.. ---
is “Hello” in Morse code.
- Letter Number Code
- Replaces each letter with its position in the alphabet.
- “Space” character is often encoded as a zero, but may be encoded as something else (or not encoded at all).
- Example: “Hello World” is encrypted as:
8-5-12-12-15-0-23-15-18-12-4
- Braille Alphabet
- Braille is a tactile writing system used by people who are visually impaired.
- Each letter corresponds to a specific pattern of raised dots.
- Atbash Cipher
- The Atbash cipher encodes a message with the reverse of the alphabet.
- Example: “Hello World” is encrypted as:
Svool Dliow
- Polybius Square Cipher
- The Polybius square places all letters in a grid; each letter is represented by its coordinates in the grid.
- A key could be used to reorder the alphabet in the square, with the letters (without duplicates) being placed at the beginning and the remaining letters following it in alphabetical order.
- Five Needle Telegraph Code
- The Five Needle Telegraph Code (a.k.a. the Cooke and Wheatstone Telegraph) is represented by three characters
\|/
in a set of 5. - Example: “Hello” is encrypted as:
/\||| /|\|| |||/\ |||/\ ||\/|
- The Five Needle Telegraph Code (a.k.a. the Cooke and Wheatstone Telegraph) is represented by three characters
- ASCII Shift Cipher
- The ASCII shift cipher is like the Caesar cipher, but the ASCII table is used instead of the Latin alphabet, yielding 127 different offsets.
- Example: “Hello World” is encrypted as:
08 25 2C 2C 2F 60 17 2F 32 2C 24
(with a shift of 64, output in hexadecimal).
- rot8000 Cipher
- “rotate alphabet 0x8000 places”.
- Variant of ROT-13 or ROT-47 adapted to Unicode with a rotation of 0x8000 (hexadecimal value).
- Example: “Hello World” is encrypted as:
籛籘籝籁簹簹簹
.
Code Beautify
CodeBeautify is an online Code formatter, decoder, converter.
- ZLib Decompress Online
- Number System Converter
- JSON Beautifier, Viewer, JSON Validator, JSON Cheat Sheet
- HTML Viewer
- Image to Base64 / Base64 to Image
- HEX to Decimal / Decimal to Hex
- Binary to Text, Binary to Decimal
- ASCII to Text
- Encryption/Decryption
- …and more
Misc. Command Line Cryptography Tools
- Ciphy
- Automatically determine cipher and output result.
- FeatherDuster
- Tool for breaking crypto (identifying and exploiting weak cryptosystems).
- Run with:
featherduster [ciphertext file 1] ... [ciphertext file n]
- Cryptanalib
- Part of the Featherduster project; can be used independently of FeatherDuster.
- Used to make Python-based crypto attack tools.
- Documentation accessed through the Python
help()
function.
- Cryptanalib3
- Python3 fork of
cryptanalib
module from FeatherDuster project. - Standalone module for performing cryptanalysis and cryptographic exploit development.
- Import: Launch Python3 and
import ca3
. - Cryptanalib3 attempts to decode, identify, and look for indicators of vulnerability with th
analyze_ciphertext()
function.
- Python3 fork of
Misc. Other decoders, etc.
- CacheSleuth
- Mutli decoder
- CyberChef
- Web app for encryption, encoding, compression, and data analysis.
- Build “recipes” to analyze data.
Magic
option tries to identify the cipher; attempts many decoding methods.
- cryptii
- Modular conversion, encoding, and encryption online
- Shamir’s Secret Sharing
- SSS is a secret sharing algorithm for distributing a secret among a group.
- The secret cannot be revealed unless a quorum of the group acts together to pool their knowledge.
- Boxentriq
- Online code-breaking, cipher, and logic puzzles solving tools.
- Classic ciphers, text and word tools, analysis tools, modern ciphers, steganography, encodings, math, alphabets, etc.
- List of Online Tools for Ciphers and Codes
- Identify Encryption or Number Base
Brute force OpenSSL encrypted file
- Bruteforce Salted OpensSL
- Try to find the password of a file that was encrypted with the
openssl
command.- OpenSSL encryption example:
openssl enc -aes256 -salt -in clear.file -out encrypted.file
- OpenSSL encryption example:
- Can be used either to try all the passwords in a file or to try all possible passwords in a given charset.
- Try to find the password of a file that was encrypted with the
- Easy Brute Force OpenSSL CTF
- Bash script that given a password (or wordlist) tries to decrypt an OpenSSL encrypted file using several algorithms.
Steganography Tools
For steganography tools, visit the Steganography Tools Page
RSA Decryption Tools
- Integer Factorization Calculator
- Prime Factorization Calculator
- RSA Calculator
- dcode RSA Cipher Calculator
- Carmichael Function Calculator
- RsaCtfTool
- Uncipher data from weak public keys and attempt to recover the corresponding private key.
AES
- bruteforce-salted-openssl
- openssl