The tools implemented below are made for the sole purpose of testing,encrypting and decrypting. Drawbacks of certain methods will be highlighted soon.
A basic XOR Encryption tools works on the principle that if A^B = C then C^B = A , this is the most basic technique of Encryption and Decryption
A hash, unlike encryption is converted permanently, this technique is mainly used for Signatures.
This is a classical algorithm which is based upon Public and Private Keys. Public keys are used for encryption, on the other hand private key is used for decryption.
MD5 Hash has been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify data integrity, but only against unintentional corruption..
The Advanced Encryption Standard, also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology in 2001.
While auditing external websites, we often come across many URI's that are encoded, the Decoder below can help one to Decode such URI's