Tool for encode/decode data recommendation
by m4r1y4k4r3y - Friday June 21, 2024 at 11:23 PM
#1
I heard about a Web Tool called Cyberchef for encode/decode data, Base64 and a lot of more things, do you recommend/use that tool or there are best options? PD: I know some tricks to do in console but i need a Framework
Reply
#2
you need to encode or to encrypt? there is a difference
Reply
#3
(Jun 28, 2024, 10:32 AM)omegatiger57 Wrote: you need to encode or to encrypt? there is a difference

I need to try different multi-functional Swiss Knifes
Reply
#4
you can use it to decode, I can't see why not, it is a useful tool for CTFs and other experiments
Reply
#5
(Jun 28, 2024, 10:45 AM)omegatiger57 Wrote: you can use it to decode, I can't see why not, it is a useful tool for CTFs and other experiments

Well, for CTFs it works good, but for certain encoded payloads and more serious bussines things i can't use it, that's the reason i asked for other tools
Reply
#6
I have done well with this tool, I don't know how complex you want the code that doesn't work for you.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Scraping | https://breachforums.ai/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#7
OK, i proceed to reveal the true reason for this thread.

When you do Pentesting, CTFs, etcetera it's a common and a good practice to check and read the code of whatever you will use, but i discovered an OPSEC potential flank in the use of web tools, specifically in web tools we are accustomed to using like Cyberchef, I am not going to say who is behind this Framework (This is everyone's own research work).

This thread was opened with a hook phrase to see if anyone had noticed this before me and apparently the answer is no, at least publicly.

Let's take a look at the possible operation of this powerful tool from behind according to my criteria.
This tool has hundreds of possibilities for encoding/decoding, encryption, etc. Well, What do you think if I tell you that most probably in the backend it has implemented a set of blacklist rules to discard most of the payloads used in the most common CTFs but that one of its major functionalities is to collect information about e.g. encrypted powershell payloads, target IPs and anything that can be used for malicious purposes such as contacting C2 servers?

I would like you to give me your point of view on all this and if any moderator sees this thread if possible to remove it to the OPSEC sub-thread and rename it at your discretion.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Looking for Best Current Free Cookies Stealer/grabber Misanotnessa 2 168 May 01, 2026, 10:52 PM
Last Post: Misanotnessa
  How to ear credits? dai5 2 195 Apr 25, 2026, 07:35 PM
Last Post: NOTFORSALE1932
  Proxy Provider spanko73 0 68 Feb 10, 2026, 05:18 PM
Last Post: spanko73
  SEARCHING SPANISH CALLERS troll 26 792 Feb 10, 2026, 05:16 PM
Last Post: spanko73
  SPAIN DATABASE 23M CITIZEN, IS THIS DB GENERATED? xdynamic 22 1,691 Feb 10, 2026, 07:44 AM
Last Post: llardo

Forum Jump:


 Users browsing this forum: 1 Guest(s)