Follow the flow CTF encoding tool is a powerful and multi-functional encoding and decoding offline integration tool. It aims to provide users with one-stop encoding and decoding solutions to meet various needs in the fields of network security, cryptography and information technology. This tool covers many classic encoding and decoding algorithms, as well as a series of innovative steganographic identification functions. It is suitable for network security, cryptography, information technology and other fields, providing users with a full range of encoding and decoding solutions. The interface is simple and the operation is simple, making it suitable for all types of users. Both beginners and professionals can benefit from it and improve the efficiency and accuracy of encoding and decoding work.
Follow the flow CTF encoding tool software instructions
CTF encoding tool is an offline integration of various encoding and decoding:
Base encryption and decryption: base64, base32, base16, base85(a), base85(b), base58, base36, base91, base92, base100, base62
ASCII, base64_to_hex, base64 steganography, arbitrary Base custom encoding table (key) encryption and decryption, Base16-32-64-91 mixed multiple decoding, base64 decompression and decoding
Rot encryption and decryption: rot13, rot5, rot18, rot47, rot8000, Rot Special
Character encryption and decryption: Caesar, bacon, Morse, fence, pigsty, a1z16, AAencode, XXencode, Uuencode, JSFuck, JJEncode, Quoted-printabl, Atbash code, Albam code, Carbonaro code, Spar Scytale encoding, Caesar
Box encoding, BrainFuck, Baudot, BubbleBabble, cloud shadow password, polybius chessboard password, Type7, DNA/CODON encoding, decabit pulse encoding, keyboard password, nine-square keyboard, tapping code, kamasutra Kama Sutra encoding, Bazeries encoding, standard encoding encoding ,Rot
Special, chinesecode, backslash, slash and pipe code Slash and
Pipe, Tomtom, Clock, GoldBug, Kenny, A1Z26 (LettersNumbers), Atbash, Albam, Carbonaro, #Abaddon, Dvorak keyboard, FiveNeedleTelegraph, Hodor
Language, NATO phonetic symbol, duck language Nak Nak
(Duckspeak), NumberPadLines, Quadoo, Qwerty (keyboard coordinates), block sorting compression Burrows–Wheeler
Transform, Hamming code verification, keyboard key code value (keyCode) code, Fernet password, whale password, Macabaka password, upper key decryption, periodic table password decryption, Martian text decryption, JS zero-width character encryption and decryption , JS tadpole text encryption and decryption
Chinese encryption and decryption: socialist core values code, Chinese character stroke code, yin and yang strange code, hundreds of surnames code, pawn shop code, Chinese telegraph code, heavenly stem and earthly branch code, Fuxi sixty-four hexagram code, and Buddhist discussion of Zen (Buddha said/This is what I heard) ), Talking Zen with the Buddha V2 (The Buddha Said Again), Heavenly Book (Yue), Braille Password, Hidden (Zero Width) Character Password
Coding conversion: Unicode-Ascii conversion, URL-str conversion, Unicode-Str conversion, Escape-Str conversion, Bytes-Str conversion, HTML-str conversion
Encryption and decryption with key Caesar custom dictionary decoding, MD5 code completion within 4 characters?, Virginia Vigenere encryption and decryption, "Gronsfeld encryption and decryption, Beaufort password encryption and decryption, automatic key Autokey password encryption and decryption, column shift Bit ColTrans password encryption and decryption, column substitution ColumnPermutation password encryption and decryption, row substitution RowsPermutation password encryption and decryption, single table substitution password encryption and decryption, simple transposition SimpleSubstitution password encryption and decryption, "keyword KeywordCipher password encryption and decryption, keyword Nihilist password encryption and decryption, One-time password OTP (one-time
pad) encryption and decryption, multiplication cipher encryption and decryption, Porta cipher encryption and decryption, Playfair encryption and decryption, FracMorse encryption and decryption, Fenham encryption and decryption, RC4 encryption and decryption, rolling key, kamasutra encoding
Multi-key encryption and decryption: Hill cipher encryption and decryption, ADFGX/ADFGVX password encryption and decryption, Foursquare encryption and decryption, double password Bifid encryption and decryption, affine cipher encryption and decryption, Polybius Square encryption and decryption,
AES/DES/3DES encryption and decryption
Base conversion: 2, 8, 10, and 16 bases can be converted to each other, 2, 8, 10, and 16 bases can be converted to ASCII characters, 10 bases can be converted to binary complement and complement, Hex can be converted to Bytes, and Bytes can be converted to Hex, BCD code, Gray code, mixed encoding and decoding of various bases, 10 Base to floating point number, IEEE745 single and double precision floating point number, string (binary) XOR, ASCII code offset (reduction), ASCII code custom value offset, string XOR number (default exhaustive 200), character XOR numbers + 1 (default exhaustive 200), long strings are separated into printable characters
Online decryption
New Testament Buddhism on Zen, Xiong Yue, Beast Sound, MD5, quipqiup online word frequency analysis, Brainfuck (online) decryption. Public key and private key (online) analysis, Cangjie encoding (online) decryption.
Other tools: word frequency analysis, English word frequency analysis, hash calculation, hash HMAC (with key) calculation, fixed-length hash shake calculation, MD4 decoding within 5 digits, "MD5 decoding within 5 digits, within 5 digits" CRC32 blasting, CRC32
Tools blasting, third-party program command running (command line window), time->time stamp conversion, "Comparison of two equal-length string ASCII codes," QWE=ABC keyboard corresponding conversion, numerical amounts converted to Chinese uppercase, find GCD ( Greatest common divisor), convert Chinese characters to pinyin, decompose prime numbers (prime numbers), decode Fibonacci numbers, SSTI template injection Key class serial number, pickle deserialization, hexadecimal string alignment completion bit 0, binary string completion to 8/16 digits, strings divided into hexadecimal by two digits, strings divided into hexadecimal by two or four. System, three-digit string divided into octal, seven-digit/eight-digit string divided into binary, various password pictures, 224 kinds of coding symbol pictures, more graphic passwords (online)
Files and pictures: files, pictures and steganography, files are read as 2/8/16 hexadecimal streams, picture-Base64 conversion, any file and Base64 conversion, hexadecimal file and Base64 conversion, 1,0 characters Convert pictures, RGB data convert pictures, X, Y coordinates convert pictures, QR code barcode decoding, GIF animation frame decomposition, horizontal combination of pictures And, merge pictures vertically, merge pictures squarely, format headers strings, add and repair file headers, zero-width characters, read files into bytes, reverse pictures up and down/left and right, zip pseudo-encryption/repair, zip multi-layer nested decompression , batch reading of multiple files in zip, zip password dictionary blasting, binwalk file inclusion detection, picture StegSolve
LBS detection, double image XOR, merge OR/AND, image Stereogram_Solver, multi-zip file CRC32 blasting, binwalk, Foremost file extraction, (string | image) blind watermark, double image blind watermark, image inversion, modify jpg Height (key), Hex
Viewer tool (the original read file is hexadecimal), gif frame viewing Stegsolve
FrameBrowser, pac traffic viewer, save hexadecimal in text files as hex files, DTMF2num dial tone recognition, w
av Morse code audio analysis, png
lsb data extraction, mpsstego steganography extraction, snow snowflake steganography extraction, jsteg steganography extraction. Read the file as text.
Starting from version 3.0, steganographic recognition of files and images has been added. Drag the file to the window and try
Automatic detection function after dragging the file:
◆ File header information, determine whether the file header information is consistent with the file name suffix and whether the file header is in reverse order.
◆ Zero-width character information contained in the file.
◆ The file contains string information commonly used in CTF competitions such as ==, flag, key, ctf, {} and so on.
◆ Read the exif information of jpg files.
◆ Read image XMP metadata.
◆ Read picture block data.
◆ Read the information after the jpg file end mark [FF D9] (there may be multiple files superimposed with steganography or followed by text steganography).
◆ Determine whether the zip is pseudo-encrypted and automatically repair the zip pseudo-encryption.
◆ Determine whether the PNG file height has been modified, and automatically repair the PNG file height steganography.
◆ Read PNG file LSB, BMP text steganography.
◆ Read the file containing base64 image information and save it as an image.
◆ Read picture block information.
Cipher text editing: intelligent segmentation, delete spaces and line breaks, replace line breaks with spaces, delete line breaks, delete spaces, delete any characters (key), replace ';|* with spaces, replace specified characters (key) with spaces, and remove characters Heavy, all characters are lowercase, all characters are uppercase, characters are case swapped, 0,1 characters are swapped, characters are reversed, Hex_str is reversed, numerical amounts are converted to Chinese uppercase, Chinese characters are converted to Pinyin, numbers are converted to English, and strings are converted to specified characters Number (key) segmentation, search and replace function
WEB tools: GET to view web pages, local XXF to view web pages, view Robot, port scanning, GET SQL injection detection, WEB website directory scanning
Right-click menu
Copy, cut, paste, Baidu online search, Youdao online translation, bsae64 decoding, 10/16/bytes hexadecimal conversion to ASCII, export to Hex file, export and save graphics and text.
Program interface functions One-click decoding, menu item list and search, decryption result search, regular search
Special instructions:
Reasons why the software crashes when running:
1. Some new computer CPUs use the AES-NI instruction set which relies on the OpenSSL library and is different from the old version: such as Intel 10th Gen (Ice Lake) CPUs or
newer (11th Gen (Rocket Lake), 12th Gen (Alder Lake), 13th Gen (Raptor
Lake) etc.
Solution:
Right-click "This Computer"-"Advanced System Settings="Environment Variables="
The new variable is named "OPENSSL_ia32cap" and the value is: "~0x200000200000000"
Or you can try to install OpenSSL
2. Some system reasons may require you to change the program file name to English or numbers.
The problem of error when decompressing after downloading:
The software uses WINRAR 5.31 for compression. If your decompression software version is too old, decompression may report an error and you need to upgrade your decompression software.
Follow the trend CTF encoding tool software update log:
1: Brand new interface, refreshing, simple and efficient
2: Performance is getting better and better
Huajun editor recommends:
As a widely used and powerful free programming tool, the latest version of the CTF coding tool software has been highly praised by many netizens. It is strongly recommended that everyone download and use it. In addition, there are also Hexiaoxiang programming client, appmaker, cc3d debugger The reference software OpenPilot GCS is recommended for everyone to download and use.