Tool for encode/decode data recommendation
by m4r1y4k4r3y - Friday June 21, 2024 at 11:23 PM
#1
I heard about a Web Tool called Cyberchef for encode/decode data, Base64 and a lot of more things, do you recommend/use that tool or there are best options? PD: I know some tricks to do in console but i need a Framework
Reply
#2
you need to encode or to encrypt? there is a difference
Reply
#3
(06-28-2024, 10:32 AM)omegatiger57 Wrote: you need to encode or to encrypt? there is a difference

I need to try different multi-functional Swiss Knifes
Reply
#4
you can use it to decode, I can't see why not, it is a useful tool for CTFs and other experiments
Reply
#5
(06-28-2024, 10:45 AM)omegatiger57 Wrote: you can use it to decode, I can't see why not, it is a useful tool for CTFs and other experiments

Well, for CTFs it works good, but for certain encoded payloads and more serious bussines things i can't use it, that's the reason i asked for other tools
Reply
#6
I have done well with this tool, I don't know how complex you want the code that doesn't work for you.
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Scraping | https://breachforums.hn/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#7
OK, i proceed to reveal the true reason for this thread.

When you do Pentesting, CTFs, etcetera it's a common and a good practice to check and read the code of whatever you will use, but i discovered an OPSEC potential flank in the use of web tools, specifically in web tools we are accustomed to using like Cyberchef, I am not going to say who is behind this Framework (This is everyone's own research work).

This thread was opened with a hook phrase to see if anyone had noticed this before me and apparently the answer is no, at least publicly.

Let's take a look at the possible operation of this powerful tool from behind according to my criteria.
This tool has hundreds of possibilities for encoding/decoding, encryption, etc. Well, What do you think if I tell you that most probably in the backend it has implemented a set of blacklist rules to discard most of the payloads used in the most common CTFs but that one of its major functionalities is to collect information about e.g. encrypted powershell payloads, target IPs and anything that can be used for malicious purposes such as contacting C2 servers?

I would like you to give me your point of view on all this and if any moderator sees this thread if possible to remove it to the OPSEC sub-thread and rename it at your discretion.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  What I need to do if my data is leaked? ilovemydady 15 1,303 03-20-2025, 12:24 PM
Last Post: termit
  Coinbase data lieos 1 388 03-15-2025, 07:16 PM
Last Post: marcthegoat
  Is there a website/tool with all databases? KingJulien 12 917 03-03-2025, 01:13 AM
Last Post: termit
  need help with data breach website atylix 1 406 02-28-2025, 02:13 PM
Last Post: DredgenSun
  Best Tool for Extracting Sensitive Data from Web Pages breachxyz 8 990 01-27-2025, 05:09 PM
Last Post: driit

Forum Jump:


 Users browsing this thread: 1 Guest(s)