Online Tools

A collection of external cipher solvers, editors, and decoders.
This is not an exhaustive list, so feel free to use your own tools, or recommend some to us on our Discord!

Our favorite tools are highlighted in gold.
Just click on a section to get started!

Programs

Programs in this section must be downloaded in order to be used. They are usually better than their website counterparts, given decent PC performance. All of the following programs are safe to download.


General Cryptography Tools

https://sites.google.com/site/cryptocrackprogram/home

CryptoCrack: An open-source cipher solving program designed to crack classical cipher types without needing the key or any known plaintext.


https://hashcat.net/hashcat/

Hashcat: A powerful password recovery tool used for cracking hashed passwords using brute-force, dictionary, and hybrid attacks. Supports GPU acceleration for high-speed performance.


https://www.cryptool.org/en/ct1/downloads/

Cryptool: An educational software suite for learning and experimenting with cryptographic algorithms and techniques. Includes visualization tools for classic and modern encryption methods.




Audio Analysis & Editing

https://www.audacityteam.org/download/

Audacity: A free, open-source audio editor and recorder. Supports multi-track editing, effects, and plugins for professional-grade audio manipulation.


https://www.sonicvisualiser.org/

Sonic Visualiser: A tool for visualizing and analyzing music recordings. Ideal for musicologists and researchers, with support for spectrograms and Vamp plugins.


https://www.spek.cc/p/download

Spek: A simple audio spectrum analyzer that displays spectrograms of audio files. Useful for checking audio quality and format characteristics.


https://github.com/Jpinsoft/DeepSound

Deepsound: A steganography tool that hides data in audio files (WAV, FLAC, etc.) and supports AES-256 encryption. Also functions as an audio converter.




Security & Network Tools

https://protonvpn.com/

ProtonVPN: A privacy-focused VPN service offering secure, encrypted internet access. Features include a no-logs policy, Stealth protocol, and support for multiple platforms.


https://sourceforge.net/projects/dirbuster/

Dirbuster: A directory brute-forcing tool used in penetration testing to discover hidden files and folders on web servers. Supports multi-threading and custom wordlists.


https://www.wireshark.org/download.html

Wireshark: A widely used network protocol analyzer that captures and inspects packets in real time. Essential for network troubleshooting and security analysis.


https://www.openpgp.org/software/kleopatra/

Kleopatra: A certificate manager and GUI for GnuPG. Supports OpenPGP and S/MIME encryption for secure file and email communication.




Steganography Programs

https://github.com/Giotino/stegsolve

Stegsolve: A Java-based image analysis tool for steganography challenges. Allows users to view different image bit planes, extract hidden data, and analyze file formats.


https://steghide.sourceforge.net/

Steghide: A command-line steganography tool that hides data in BMP, JPEG, WAV, and AU files. Supports AES encryption and compression for secure embedding.


https://www.kali.org/tools/stegsnow/

Stegsnow: A whitespace steganography tool that hides messages in ASCII text files by appending tabs and spaces. Offers optional compression and encryption.


https://steganpeg.apponic.com/

Steganpeg: A lightweight Windows tool that hides multiple files inside JPEG images. Supports password protection and shows space usage for embedded data.


https://www.rbcafe.com/software/outguess/

Outguess: A universal steganographic tool that embeds hidden data into JPEG and PNM images by modifying redundant bits. Known for its use in cryptographic puzzles.


https://openpuff.en.lo4d.com/windows

OpenPuff: A robust steganography and watermarking tool for Windows. Supports multiple carrier formats (images, audio, video) and uses multi-layered encryption and obfuscation.


https://sourceforge.net/projects/silenteye/

SilentEye: A cross-platform steganography application with a user-friendly interface. Hides data in BMP, JPEG, and WAV files using AES encryption and supports drag-and-drop functionality.

Multitool

Cipher Identifiers

These websites can help you identify the type of cipher in an unknown text. They are not always 100% accurate, and you may have to test some of the top recommendations.


https://www.dcode.fr/cipher-identifier
https://bionsgadgets.appspot.com/gadget_forms/refscore_extended.html
https://www.boxentriq.com/code-breaking/cipher-identifier

Decoders

These sites have a variety of tools to handle multiple different ciphers.


https://www.dcode.fr/en

Easier for beginners, as most tools have a method to work out the key automatically.


https://cyberchef.org/

Most tools require you to input the valid key, rather that being able to do it automatically. This requires more practice to use, but is better at chaining together ciphers in long cipherstacks.



Base64+

Base64 & Encoding Utilities

These tools focus on decoding or brute-forcing Base64-encoded data, even if when casing is missing.


https://corgi.rip/dive

Dumpster Diver: A brute-force tool designed to decrypt data with modern encryption, such as AES.


https://potatosfield.neocities.org/tools/b64brute/base64Brute

b64Brute: A manual Base64 decoder that helps recover original text when casing (uppercase/lowercase) is lost.


https://www.samltool.com/decode.php

Samltool: Decodes and validates SAML XML messages. Useful for debugging identity federation and SSO configurations.



AES Encryption/Decryption Tools

These tools use the Advanced Encryption Standard (AES) for secure symmetric encryption and decryption of text or files.


https://aesencryption.net/

Aesencryption: A straightforward AES encryption/decryption tool supporting multiple cipher modes and key sizes.


https://www.online-toolz.com/tools/text-encryption-decryption.php/

Stupid Base64: An AES-based encryption tool that outputs Base64-encoded ciphertext.


https://encipher.it/

Encipher.it: A browser-based AES encryption tool with optional PGP compatibility.


https://pteo.paranoiaworks.mobi/

Paranoiaworks: A suite of AES-based encryption tools including EAX mode.


https://decipher.wiki/aes-decryption

Aesdecryption: A reference site for decrypting AES-encrypted data. Offers guidance and examples for various AES modes.


https://asecuritysite.com/encryption/ferdecode

Ferdecode: A Fernet token decoder using AES-CBC with HMAC-SHA256. Decodes tokens starting with gAAAAA securely.


https://www.browserling.com/tools/aes-encrypt

Browserling: Encrypts data using OpenSSL-compatible AES with salt.


https://www.devglan.com/online-tools/text-encryption-decryption

Devglan: A versatile AES encryption/decryption tool supporting multiple modes and padding schemes.


https://www.invertexto.com/texto-criptografado

Invertexto: A Brazilian site offering AES encryption for text. Simple interface with optional key input.


https://encode-decode.com/aes256-encrypt-online/

Encode-Decode: Supports AES-256 encryption with a wide range of cipher modes.


https://anycript.com/

Anycript: A privacy-focused AES encryption tool that runs entirely in-browser. Supports CBC and ECB modes with multiple key sizes.


https://web.archive.org/web/20220915201921/https://cryptoji.com/

Cryptoji: Encrypts messages using AES and represents ciphertext as emojis.



Miscellaneous

https://codebeautify.org/encrypt-decrypt

Codebautify: Offers encryption using the Arcfour (RC4) stream cipher.

Hash

Hash Identifiers

These tools can be used to identify the hashing algorithm used to map an input into a fixed-size output.


https://hashes.com/en/tools/hash_identifier
https://www.dcode.fr/hash-identifier
https://www.tunnelsup.com/hash-analyzer/

Hash Crackers

The following sites can help to find the input used to generate a hash. Note that a hash is a many-to-one function, so it may be difficult to find the input. Installing hashcat requires more technical knowledge, but may facilitate greater success.


https://hashmob.net/search
https://hashes.com/en/decrypt/hash
https://crackstation.net/

Miscellaneous

https://hashes.com/en/johntheripper/zip2john

Zip/Rar file hash extractor.


https://hashcat.net/wiki/doku.php?id=example_hashes

A list of hash types and their corresponding examples.

Audio

These sites can help you analyse or decode audio from a file.


https://morsecode.world/international/decoder/audio-decoder-adaptive.html

Allows you to decode morse into text from an audio file.


https://spectrogram.sciencemusic.org/

Allows you to analyse the frequency components of an audio file.


https://dood.al/oscilloscope/

Allows you to view an audio file through an oscilloscope.

Steganography

Image Editors

These sites can help you view or edit an image.


https://www.photopea.com/
https://www.pixilart.com/
https://www.canva.com/photo-editor/

Steganography

Steganography is a method of hiding data in plain sight. These tools can help to detect and decode such data if it exists.


https://aperisolve.fr/

Has a variety of built-in tools, such as Binwalk, Steghide, Outguess, Foremost, Strings, Exiftool & Zteg.

https://www.georgeom.net/StegOnline/upload/
https://www.mobilefish.com/services/steganography/steganography.php
https://www.pelock.com/products/steganography-online-codec
https://www.peter-eigenschink.at/projects/steganographyjs/showcase/
https://encrypt.imageonline.co/
https://manytools.org/hacker-tools/steganography-encode-text-into-image/[PNG only]
https://futureboy.us/stegano/decinput.html [JPG only]


Manual Identification Lists

These lists identify common types of groups and their classifications, and common elements to watch out for.


https://docs.google.com/spreadsheets/d/1R1Lx46fIdX9LeZatuh0L6e-lLuNp4k1dqM4PBmMXQ7E/edit#gid=0

Allows you to identify common characteristics of many steganography programs.


https://decipher.wiki/symbols

This is a list of common symbols used to encode texts.


https://decipher.wiki/cryptographers

This shows famous cryptographers, along with their portrait for identification.



Image Forensics

These tools can be used to find out more data about a specific image.


https://www.metadata2go.com/
https://rawpixels.net/
https://29a.ch/photo-forensics/#forensic-magnifier

Miscellaneous

These tools don't fit nicely into the other categories, but are still useful for the specific purpose written in their respective description.


https://stegonline.georgeom.net/image

Can extract the RGB value of a pixel from an image.


https://merricx.github.io/qrazybox/

Allows you to build or recover QR codes.


http://laighside.com/punchcard.htm

Used for decoding punch cards.


https://monman53.github.io/2dfft/

Can be used to understand 2D image Fourier transform.

Auto-Solvers

Caesar

The links below are useful for solving Caesar and other rotation-based ciphers.


https://a4x.me/tools/text/
http://theblob.org/rot.cgi
https://multidec.web-lab.at/mr.php
https://planetcalc.com/1434/

Multi-language: supports English, French, Portuguese, Russian & Spanish.



Monoalphabetic Substitution

These pages are useful for decoding standard substitution ciphers, also known as cryptograms.


https://quipqiup.com/

Has various modes of solving a substitution.


https://www.boxentriq.com/code-breaking/cryptogram

Contains explanation of the cipher and allows manual solving.


https://www.guballa.de/substitution-solver

Multi-language: supports English, German, Spanish, French, Dutch & Portuguese.



Vigenère

The following websites are useful at decoding polyalphabetic Vigenère ciphers automatically. A tabula recta can be useful if you want to understand the process.

Vigenère can be tricky sometimes, so it may be worth trying all the tools here.


https://www.boxentriq.com/code-breaking/vigenere-cipher

Uses a dictionary attack, which can help if the key is a word.


https://www.dcode.fr/vigenere-cipher

Allows for a lot of customization, and can decode automatically.


https://www.guballa.de/vigenere-solver

Multi-language: supports English, German, Spanish, French, Dutch & Portuguese.


https://f00l.de/hacking/vigenere.php

Can calculate the period of the key.



Autovig

A polyalphabetic cipher where the key starts with a keyword and continues with the plaintext itself, making it harder to break than repeating-key ciphers.

https://www.dcode.fr/autoclave-cipher
https://www.cachesleuth.com/autokey.html
https://cipherutility.com/tools/autokey-cipher


Beaufort

A reciprocal polyalphabetic cipher similar to Vigenère, but it subtracts plaintext from the key instead of adding.

https://www.dcode.fr/beaufort-cipher
https://www.boxentriq.com/code-breaking/beaufort-cipher
https://cryptii.com/pipes/beaufort-cipher


Affine

A monoalphabetic cipher that encrypts letters using the mathematical formula: (ax + b) mod 26, requiring a to be coprime with 26.

https://www.dcode.fr/affine-cipher
https://cryptii.com/pipes/affine-cipher
https://encryptdecrypt.tools/tools/ciphers/affine.php


Railfence

A transposition cipher that writes text in a zigzag pattern across multiple "rails" and reads it row by row.

https://www.dcode.fr/rail-fence-cipher
https://www.boxentriq.com/code-breaking/rail-fence-cipher
https://cryptii.com/pipes/rail-fence-cipher


Shifts

A simple substitution cipher where each letter is shifted by a fixed number of positions in the alphabet or a character set.

https://www.dcode.fr/ascii-shift-cipher
https://goto.pachanka.org/crypto/shift-cipher/


Byte Shifts

Applies shift or XOR operations at the byte level, often used for binary or ASCII data rather than alphabetic text.

https://cyber.meme.tips/xlate/shifts.html


Keyboard Shifts

Substitutes letters based on their position on a keyboard layout, such as QWERTY/DVORAK.

https://www.dcode.fr/keyboard-shift-cipher
https://goto.pachanka.org/crypto/shift-cipher/

OSINT

https://lens.google/

Can help you to reverse search an image if it exists online.


https://www.dorksearch.com/

Allows for more complex google queries.


https://osintframework.com/

A framework of other OSINT tools, categorized.


https://www.myfonts.com/pages/whatthefont

Good identification of the font used in an image. Can be used to distinguish between similar looking chracters like O/0, I/l/1, etc.

Others

https://hexed.it/

HexEd: Online hex editor for viewing and editing binary files. Supports multiple encodings and hashing.


https://www.dcode.fr/alphabetic-transcription

N-Gram Transcription: Converts symbols or Unicode into grouped alphabetic text. Useful for decoding n-gram patterns.


https://www.soscisurvey.de/tools/view-chars.php

SoSci: Displays hidden or non-printable characters with Unicode info.


https://www.onelook.com/

Word Finder: Finds words matching letter patterns or wildcards. For example, ??i???n??e => chimpanzee.


https://a4x.me/tools/link/

Link Identifier: Resolves short codes (e.g. YouTube IDs) into full URLs. For example, oHg5SJYRHA0 => https://www.youtube.com/watch?v=oHg5SJYRHA0.


https://cyber.meme.tips/xlate/shifts.html

Byte Shift: Shows all byte shifts and XOR variants of input data.


https://www.browserling.com/tools/text-invert-case

Casing Inverter: Flips uppercase to lowercase and vice versa.


https://onlinetexttools.com/remove-all-whitespace-from-text

Whitespace Remover: Deletes all spaces, tabs, and newlines from text.


https://norvig.com/mayzner.html

Shows letter frequency, bigram frequency and other statistics about the English language.


https://tio.run/#

TIO: Runs esoteric programming languages in-browser.


https://www.mobilefish.com/services/big_number/big_number.php

Large number converter: Converts numbers between binary, hex, decimal, and Base64.


https://330k.github.io/misc_tools/unicode_steganography.html

Unicode Steganography Decoder: Detects invisible Unicode characters hiding text.


https://online-free-tools.com/en/youtube_video_tags_extract_url

YouTube Tag Extractor: Extracts tags and metadata from YouTube video URLs.


https://merricx.github.io/qrazybox/

QRazyBox: Allows you to build or recover QR codes.