My Pentesting Space
LinkedIn
  • Welcome to Hackjiji
  • 🕸️web pentesting
    • Basics
    • Web pentest cheatsheet
    • Burpsuite and browser tricks
    • cUrl cheatsheet
    • CVE exploitation
    • JavaScript Obfuscation/Deobfuscation
  • Network pentesting
    • Basics
    • Nmap favorites
    • Host discovery
    • Port scanning
    • Network Services
      • RPC-NFC
      • WINRM - 5895-5896
      • FTP - 21
      • SMB - 445
      • RDP - 3389
      • SSH - 22
      • SMTP - 25
    • Firewall evasion
    • Pivoting and double pivoting
  • Physical pentesting
    • Bad USB - Rubber Duckies
  • Linux pentesting
    • Usefull command's
    • Privilege escalation
  • windows pentesting
    • Windows useful commands
    • Windows Reverse shell codes
    • Privilege escalation
  • Active Directory pentesting
    • Basics
    • AD
    • AAD
  • General
    • Hash cracking
    • Wordlist
    • Encoding/decoding
    • Environment setup
      • Install a new OS on seperated boot sector
      • Hyper-V
      • Virtualbox
    • Reverse-shell-cheatsheet
    • Metasploit cheatsheet
    • Vulnerability research
    • My scanning methodology
  • Events
    • HackTheBox Meetup - LFI2RCE
    • Radio Equans - QR Code Awareness campaign
    • Cybersecurity job campaign
Powered by GitBook
On this page
  1. General

Encoding/decoding

PreviousWordlistNextEnvironment setup

Last updated 4 months ago

CyberChef can encode and decode a wide variety of languages. It's especially useful when the encoding technique is unknown, as it offers functionality to automatically detect and decode the encoding method used.

Base64/HEX/ROT13 encoding and decoding

# base64 encode
echo hackthebox | base64

# base64 decode	
echo ENCODED_B64 | base64 -d
	
# hex encode
echo hackthebox | xxd -p
	
# hex decode
echo ENCODED_HEX | xxd -p -r	

# rot13 encode
echo hackthebox | tr 'A-Za-z' 'N-ZA-Mn-za-m'
	
# rot13 decode
echo ENCODED_ROT13 | tr 'A-Za-z' 'N-ZA-Mn-za-m'	
CyberChef
Logo