OK, i proceed to reveal the true reason for this thread.
When you do Pentesting, CTFs, etcetera it's a common and a good practice to check and read the code of whatever you will use, but i discovered an OPSEC potential flank in the use of web tools, specifically in web tools we are accustomed to using like Cyberchef, I am not going to say who is behind this Framework (This is everyone's own research work).
This thread was opened with a hook phrase to see if anyone had noticed this before me and apparently the answer is no, at least publicly.
Let's take a look at the possible operation of this powerful tool from behind according to my criteria.
This tool has hundreds of possibilities for encoding/decoding, encryption, etc. Well, What do you think if I tell you that most probably in the backend it has implemented a set of blacklist rules to discard most of the payloads used in the most common CTFs but that one of its major functionalities is to collect information about e.g. encrypted powershell payloads, target IPs and anything that can be used for malicious purposes such as contacting C2 servers?
I would like you to give me your point of view on all this and if any moderator sees this thread if possible to remove it to the OPSEC sub-thread and rename it at your discretion.