当前位置:网站首页>CTF online encryption and decryption and common tools
CTF online encryption and decryption and common tools
2022-08-09 17:18:00 【AHlien】
In the beginning of CTF, finding tools is the most annoying and the easiest part to dispel our enthusiasm. I share some encryption and decryption, coding, CTF tools, algorithms, etc. that I have used and recorded before.To everyone, I hope to be helpful to everyone, and jointly contribute to the network security of the motherland!
Binary to text site
http://www.txttool.com/t/?id=NDE5
Knight CMSstrong>
https://www.74cms.com/
Convert Unicode encoding to characters
https://www.runoob.com/jsref/jsref-fromcharcode.html
Convert Unicode to Chinese
https://www.bejson.com/convert/unicode_chinese/
Audio morse decoding
https://morsecode.world/international/decoder/audio-decoder-adaptive.html
DES/TripleDes/AES/RSA/SM2/SM3/SM4 encryption and decryption
https://the-x.cn/en-us/cryptography/TripleDes.aspx
CTF encryption and decryption collection
http://ctf.ssleye.com/
ROT5/13/18/47 encodingConvert
https://www.qqxiuzi.cn/bianma/ROT5-13-18-47.php
CTF Repository
https://www.ctftools.com/
Encryption and decryption with Buddhism and Zen
https://www.keyfc.net/bbs/tools/tudoucode.aspx
The large collection of CTF encryption and decryption contains the online encryption and decryption tools we often use, as well as encoding, CTF algorithms, CTF miscellaneous, etc.
The CTF resource library contains the CTF tools we often use
Can only be used for learning, illegal use at your own risk!
边栏推荐
- Virtualbox 设置共享文件夹
- 【 Leetcode 】 433. The smallest genetic changes
- hugging face tutorial - Chinese translation - tokenizers using Tokenizers
- hugging face tutorial - Chinese translation - share a model
- AlexNet pytorch实现
- 【力扣】593. 有效的正方形
- 【深度学习】attention机制
- Postgraduate Work Weekly (Week 13)
- 【Postgraduate Work Weekly】
- 【知识分享】Modbus通信协议详解
猜你喜欢
LeNet5 pytorch实现
Vim实用技巧_2.普通模式和插入模式
Correlation analysis
[Deep Learning] SVM solves the linear inseparable situation (8)
【研究生工作周报】
Stetman读peper小记:Defense-Resistant Backdoor Attacks Against DeepNeural Networks in Outsourced Cloud
【Postgraduate Work Weekly】(The third week)
【论文阅读】LIME:Low-light Image Enhancement via Illumination Map Estimation(笔记最全篇)
CRM定制开发需要多少钱 CRM系统定制开发价格
Vim实用技巧_8.替换(substitute)和global命令
随机推荐
Basic Terms of Machine Learning
【Postgraduate Work Weekly】(Week 8)
【力扣】593. 有效的正方形
深入浅出最优化(5) 共轭梯度下降法
堆(heap)系列_0x0A:3种方法一次性解决堆溢出问题
Data Fitting Methods Application of MATLAB in Mathematical Modeling (Second Edition)
Vitis部分实验记录
时间序列分析
【工具使用】Keil5软件使用-基础使用篇
Hold face (hugging face) tutorial - Chinese translation - task summary
【深度学习】模型选择、欠/过拟合和感受野(三)
解决pyqt5 DLL load failed: 找不到指定的程序的问题
Postgraduate Work Weekly (Week 13)
ConvNext笔记
【Leetcode】433. 最小基因变化
规划问题的MATLAB求解——MATLAB在数学建模中的应用(第2版)
【Postgraduate Work Weekly】(Week 9)
图论最短路径求解
蓝桥杯嵌入式第十三届模拟题做题笔记
[Paper reading] LIME: Low-light Image Enhancement via Illumination Map Estimation (the most complete notes)