// INTERACTIVE PLAYGROUND

HACKER'S TOOLKIT_

Encode · Decode · Hash · Transform — All in your browser, nothing sent to any server

BASE64 ENCODER / DECODER
Input
Output

WHAT IS BASE64?

Encodes binary data using 64 printable ASCII characters. Used in JWT tokens, email attachments, data URIs, and HTTP Basic Auth.

SPOT IT

Ends with = or == padding. Only uses A–Z, a–z, 0–9, +, / characters. Common in web tokens and encoded payloads.

SECURITY NOTE

Base64 is NOT encryption — it's encoding. Anyone can decode it instantly. Never use it to hide sensitive data.

Input (Text or Hex)
Output

HEX ENCODING

Represents each byte as two hexadecimal digits (00–FF). Used in debuggers, packet analysis, memory dumps, and shellcode.

COMMON USE

Wireshark packet data, shellcode (\\x41\\x42), colour codes (#FF0000), file magic bytes (MZ header = 4D 5A).

Input
Output

URL ENCODING

Replaces special characters with % + hex value. Essential for passing special chars in query strings without breaking URLs.

SECURITY

Double encoding (%2520 = %25 + 20) bypasses some WAF/input filters. Common in path traversal: %2F = /, %2E%2E = ..

Shift: 13
Input
Output
Input
Output (applying again reverses)

ROT13

Rotates each letter by 13 places. Self-inverse: applying twice returns original. Used in forums to hide spoilers.

ROT47

Rotates all printable ASCII chars (33–126) by 47. Used in CTFs and simple obfuscation of full text including symbols.

Input (Text or Binary)
Output
Input Text

MD5

128-bit hash. Broken for security — collision attacks exist. Still used for file integrity checks, never for passwords.

SHA-1

160-bit hash. Deprecated for TLS/code signing since 2017. Still seen in git commit hashes and legacy systems.

SHA-256/512

Current standard. SHA-256 used in Bitcoin, TLS certificates, HMAC signatures. SHA-512 for higher security needs.

PASSWORD HASHING

Never use MD5/SHA for passwords! Use bcrypt, Argon2, or scrypt — they're intentionally slow to resist cracking.

JWT Token

JWT STRUCTURE

Header.Payload.Signature — each part is Base64URL encoded. The signature validates integrity.

SECURITY ISSUES

alg:none attack, weak secrets, sensitive data in payload (it's not encrypted!), no expiry validation, algorithm confusion.

REMEMBER

JWT payload is only Base64 encoded — anyone can read it. Never store secrets in JWT payload without encryption (use JWE).

INPUT LENGTH: 0
OUTPUT LENGTH: 0
TOOL: BASE64
⚡ All processing is local — zero data sent to servers
✓ Copied to clipboard