Interactive guides for CyberChef encryption and data format operations
Back to CyberChefLearn how to use CyberChef's LS47 cipher operations for secure encryption and decryption. Includes interactive encryption simulator and character set explorer.
⚡Explore the ChaCha stream cipher designed by Daniel J. Bernstein. Modern, fast encryption with excellent security properties and performance on mobile devices.
🔍Understand Type-Length-Value encoding and how to parse TLV data into JSON format. Features interactive parser and TLV builder widgets.
📋Parse and visualize property list files from macOS, iOS, NeXTSTEP, and GNUstep frameworks. View serialized objects in an interactive tree format.
🔧Learn how to translate machine language into assembly language. Understand x86 architecture, common instructions, and reverse engineering fundamentals.
🔑Understanding Citrix CTX1 password encoding format. Learn how to encode and decode passwords stored in Citrix configuration files and ICA connection profiles.
⚙️Encipher and decipher messages using the famous WWII Enigma machine. Explore rotor configurations, plugboard settings, and historical cryptography.
🔓Emulation of the Bletchley Park Bombe used to break Enigma encryption. Learn about automated cryptanalysis based on Polish and British innovations.
🔒Modern password hashing functions designed to be computationally expensive. Learn about cost factors, key derivation, and secure password storage.
🔍Convert data to and from hexdump format. Essential for debugging, binary analysis, and understanding how data is stored at the byte level.
📊Calculate Shannon entropy to measure randomness and information content. Detect encryption, analyze compression, and assess data characteristics.
🌐Convert percent-encoded URLs back to readable format. Essential for web development, security analysis, and debugging HTTP parameters.
🔐Extract and analyze SSL/TLS certificate information. Understand PKI, verify certificate details, and troubleshoot security issues.
🔎Generate HASSH fingerprints to identify SSH clients and servers. Learn network fingerprinting techniques for threat detection and security monitoring.