|---[ CTF Schedules / Primers / Tool Lists ]
[CTFtime.org - All about CTF (Capture The Flag)] :: (https://ctftime.org/)
[securityCTF - CTF Announcements] :: (https://www.reddit.com/r/securityCTF/)
[CTF Field Guide] :: (https://github.com/trailofbits/ctf)
[CSC Learn - CTF Instructions] :: (https://bobbyluig.gitbooks.io/csc-learn/)
[Square CTF Tips] :: (http://squarectf.com/tips.html)
[Awesome CTF] :: (https://github.com/apsdehal/awesome-ctf/)
[CTF Candy] :: (https://github.com/flawwan/CTF-Candy)
[CTF-Katana] :: (https://github.com/JohnHammond/ctf-katana/)
[G0tmi1k's Blog - How to Guides, Scripts and Videos] :: (https://blog.g0tmi1k.com/)
[NeverEnding Security CTF Field Guide] :: (https://neverendingsecurity.wordpress.com/2015/04/20/ctf-field-guide/)
[Host/Network Security Wiki] :: (https://github.com/osirislab/Project-Ideas/wiki)
[Vagrant CTF Box] :: (https://github.com/wuntee/vagrant-ctf/)
[Vagrant CTF Box 64-bit] :: (https://github.com/ctfhacker/ctf-vagrant-64)
[CTF Tool Lists] :: (https://github.com/zardus/ctf-tools)
[CTF Tool Downloads] :: (https://github.com/MrMugiwara/CTF-Tools)
[NeverLAN CTF Resources] :: (https://neverlanctf.com/resources)
[CTF Resources - Go. Hunt. Cap Flags.] :: (https://www.doyler.net/security-not-included/ctf-resources)
[CTFTime Write-ups Link Builder] :: (https://github.com/mzfr/lswriteups)
|---[ Hacking Challenges / Vulnerable Systems / Practice CTFs ]
[Hack The Box - The #1 Cybersecurity Performance Center] :: (https://www.hackthebox.com/)
[Hacking-Lab.com] :: (https://hacking-lab.com/)
[Hack This Site - Training ground for hackers] :: (https://www.hackthissite.org/)
[Root Me - Hacking and Information Security learning platform] :: (https://www.root-me.org/)
[TryHackMe - A free online platform using hands-on exercises and labs through your browser] :: (https://tryhackme.com)
[Backdoor - Security Platform by SDSLabs] :: (https://backdoor.sdslabs.co/)
[Crackmes - Reverse Engineering Challenges] :: (https://crackmes.one/)
[CryptoHack - Fun cryptography challenges] :: (https://cryptohack.org/)
[SmashTheStack - A variety of wargames maintained by the SmashTheStack Community] :: (http://smashthestack.org/)
[Hacker101- CTF from HackerOne] :: (https://www.hacker101.com/)
[VulnHub - Vulnerable By Design] :: (https://www.vulnhub.com/)
[MicroCorruption - Embedded Security CTF] :: (https://microcorruption.com/login)
[Slavehack 2 - Online Hacking Game] :: (https://www.slavehack2.com/)
[s0urce.io - The Hacking Game] :: (http://s0urce.io/)
[OverTheWire - Wargames] :: (http://overthewire.org/wargames/)
[NightHawk CTF] :: (https://ctf.nihwk.net/)
[CSAW 365 CTF] :: (https://365.csaw.io/)
[XCTF Training Portal] :: (http://oj.xctf.org.cn/web/practice/)
[try2hack - Security-Oriented Challenges] :: (http://www.try2hack.nl/)
[picoCTF - Computer Security Game] :: (https://picoctf.com/)
[CTFS.ME - Learn CTF] :: (https://ctfs.me/)
[The Journey Begins] :: (http://gracker.org)
[echoCTF.RED - Online CTF with a variety of targets to attack] :: (https://echoctf.red/)
[Exploit Exercises - Variety of VMs to learn variety of computer security issues] :: (https://exploit-exercises.lains.space/)
[Exploit.Education - Variety of VMs to learn variety of computer security issues] :: (http://exploit.education)
[Hone Your Ninja Skills - Web challenges starting from basic ones] :: (https://honeyourskills.ninja/)
[Over The Wire - Wargame maintained by OvertheWire Community] :: (http://overthewire.org/wargames/)
[IO - Wargame for binary challenges] :: (http://io.netgarage.org/)
[Microcorruption - Embedded security CTF] :: (https://microcorruption.com)
[PWN Challenge - Binary Exploitation Wargame] :: (http://pwn.eonew.cn/)
[Pwnable.kr - Pwn Game] :: (http://pwnable.kr/)
[Pwnable.tw - Binary wargame] :: (https://pwnable.tw/)
[Pwnable.xyz - Binary Exploitation Wargame] :: (https://pwnable.xyz/)
[Reversin.kr - Reversing challenge] :: (http://reversing.kr/)
[Ringzer0Team - Ringzer0 Team Online CTF] :: (https://ringzer0team.com/)
[ROP Wargames - ROP Wargames] :: (https://github.com/xelenonz/game)
[Viblo CTF - Various amazing CTF challenges, in many different categories] :: (https://ctf.viblo.asia)
[W3Challs - A penetration testing training platform offering computer challenges in various categories] :: (https://w3challs.com)
[WebHacking - Hacking challenges for web] :: (http://webhacking.kr)
|---[ CTF Platforms ]
[CTFd - Capture The Flag framework] :: (https://github.com/CTFd/CTFd)
[echoCTF.RED - Develop, deploy and maintain your own CTF infrastructure] :: (https://github.com/echoCTF/echoCTF.RED)
[Haaukins - A Highly Accessible and Automated Virtualization Platform for Security Education] :: (https://github.com/aau-network-security/haaukins)
[HackTheArch - CTF scoring platform] :: (https://github.com/mcpa-stlouis/hack-the-arch)
[Mellivora - A CTF engine written in PHP.] :: (https://github.com/Nakiami/mellivora)
[MotherFucking-CTF - Badass lightweight plaform to host CTFs] :: (https://github.com/andreafioraldi/motherfucking-ctf)
[NightShade - A simple security CTF framework] :: (https://github.com/UnrealAkama/NightShade)
[OpenCTF - CTF in a box with minimal setup required] :: (https://github.com/easyctf/openctf)
[PicoCTF - The platform used to run picoCTF. A great framework to host any CTF] :: (https://github.com/picoCTF/picoCTF)
[PyChallFactory - Small framework to create/manage/package jeopardy CTF challenges] :: (https://github.com/pdautry/py_chall_factory)
[RootTheBox - A Game of Hackers (CTF Scoreboard & Game Manager)] :: (https://github.com/moloch--/RootTheBox)
[Scorebot - Platform for CTFs by Legitbs (Defcon)] :: (https://github.com/legitbs/scorebot)
[SecGen - Security Scenario Generator (creates randomly vulnerable virtual machines)] :: (https://github.com/cliffe/SecGen)
|---[ Time Zone Information ]
[Time Zone Converter] :: (https://savvytime.com/converter)
[Time Zone Map] :: (https://www.timeanddate.com/time/map/)
[Time Zone Abbreviations] :: (https://www.timeanddate.com/time/zones/)
|---[ Notes / Files ]
[PrivateBin] :: (https://paste.ccc.ac/)
[Paste-Bin Ubuntu] :: (https://paste.ubuntu.com/)
[ProtectedText - Encrypted notes, access anywhere] :: (https://www.protectedtext.com)
[Edit Pad - Online Text Editor & Wordpad for Notes] :: (http://www.editpad.org/)
[DropMeFiles - One-click File Sharing Service] :: (https://dropmefiles.com)
|---[ Communication Servers ]
[Team Collaboration (Messaging, File Sharing)] :: (https://slack.com/)
[Team Collaboration (Project Management)] :: (https://trello.com/)
[Discord (Voice & Text Chat)] :: (https://discordapp.com/login)
[Freenode Webchat IRC] :: (https://webchat.freenode.net/)
[Kiwi IRC] :: (https://kiwiirc.com/client)
[Discover Discord Servers] :: (https://disboard.org/)
|---[ Music / Streaming ]
[Mixcloud - Making Radio Better] :: (https://www.mixcloud.com/)
|---[ Reconnaissance ]
[ReqBin Online Curl] :: (https://reqbin.com/curl/)
[CURL Converter] :: (https://curlconverter.com/)
[Online WGET Tool] :: (https://wget.alanreed.org/)
[Network-Tools] :: (http://network-tools.com/)
[MXToolbox] :: (https://mxtoolbox.com/NetworkTools.aspx)
[CentralOps] :: (http://centralops.net/co/)
[UltraTools] :: (https://www.ultratools.com/)
[PolySwarm - Scan URLs for threats] :: (https://polyswarm.io/)
[URLVoid] :: (http://www.urlvoid.com/)
[URL Scan] :: (https://urlscan.io/)
[URLQuery] :: (http://urlquery.net/)
[URL Parser / Query String Splitter] :: (https://www.freeformatter.com/url-parser-query-string-splitter.html)
[ScanURL] :: (http://scanurl.net/)
[Web-Sniffer] :: (http://web-sniffer.net/)
[Safeweb (Norton)] :: (https://safeweb.norton.com/)
[Lookup IP Address Location (IPv4/IPv6)] :: (http://whatismyipaddress.com/ip-lookup)
[IPVoid] :: (http://www.ipvoid.com/)
[ToolsVoid] :: (http://www.toolsvoid.com/)
[SecurityTrails - Extensive DNS data] :: (https://securitytrails.com/)
[DNSDumpster - Search DNS records] :: (https://dnsdumpster.com/)
[DNS Stuff] :: (http://www.dnsstuff.com/tools)
[DNS Goodies] :: (http://dnsgoodies.com/)
[RobTex] :: (https://www.robtex.net/)
[Metre.net] :: (http://metre.net/)
[Open Source Intelligence (OSINT)] :: (https://inteltechniques.com/menu.html)
[GeoSpy - The Worlds Best AI Geolocation Tool] :: (https://geospy.ai/)
[LeakIX - Search publicly indexed information] :: (https://leakix.net/)
[Hunter.io (Email Hunter)] :: (https://hunter.io/)
[DorkSearch - Google Dorking] :: (https://dorksearch.com/)
[Whois] :: (http://network-tools.com/default.asp?prog=whois)
[Whois Request] :: (http://whoisrequest.com/)
[Whois History] :: (http://whoisrequest.org/history/)
[PublicWWW - Marketing and affiliate marketing research] :: (https://publicwww.com/)
[Internet Archive (Wayback Machine)] :: (https://archive.org/web/)
|---[ Threat Hunting & Intelligence ]
[ExploitDB - Archive of various exploits] :: (https://www.exploit-db.com/)
[Packet Storm Security - Browse latest vulnerabilities and exploits] :: (https://packetstormsecurity.com/)
[Vulners - Search vulnerabilities in a large database] :: (https://vulners.com/)
[MITRE ATT&CK Matrix] :: (https://attack.mitre.org/matrices/enterprise/)
[CVE - Search CVE List] :: (https://cve.mitre.org/cve/search_cve_list.html)
[Deepviz Threat Intelligence] :: (https://intel.deepviz.com/)
[ThreatVault by Palo Alto Networks] :: (https://threatvault.paloaltonetworks.com/)
[AlienVault - Open Threat Exchange] :: (https://otx.alienvault.com/)
[IBM X-Force Exchange] :: (https://exchange.xforce.ibmcloud.com/new)
[Get Ahead of Present and Future Attacks] :: (https://www.recordedfuture.com/)
[Crowdsourced IP feed from ThreatCrowd] :: (http://iplists.firehol.org/?ipset=threatcrowd)
[Crowdsourced feeds from ThreatCrowd] :: (http://threatcrowd.blogspot.co.uk/2016/02/crowdsourced-feeds-from-threatcrowd.html)
[Crowdsourced Domain Feed] :: (https://www.threatcrowd.org/feeds/domains.txt)
[Crowdsourced IP Feed] :: (https://www.threatcrowd.org/feeds/ips.txt)
[Crowdsourced Hash Feed] :: (https://www.threatcrowd.org/feeds/hashes.txt)
[ThreatCrowd] :: (https://www.threatcrowd.org/)
[CINS Score (ci-badguys.txt)] :: (http://cinsscore.com/list/ci-badguys.txt)
[Groups - MITRE ATT&CK] :: (https://attack.mitre.org/groups/)
[APT Groups and Operations] :: (https://docs.google.com/spreadsheets/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/pubhtml#)
[Majestic Million CSV] :: (http://downloads.majestic.com/majestic_million.csv)
[Alexa Top 1 Million Sites (Retired)] :: (https://s3.amazonaws.com/alexa-static/top-1m.csv.zip)
[ThreatMiner - Data Mining for Threat Intelligence] :: (https://www.threatminer.org/)
[Cymon.io - Open Threat Intelligence] :: (https://cymon.io/)
[Cymon.io Dashboard] :: (https://cymon.io/cp/)
[Pulsedive - Search for threat intelligence] :: (https://pulsedive.com/)
[Fofa - Search for various threat intelligence] :: (https://fofa.so/)
[ONYPHE - Collects cyber-threat intelligence data] :: (https://www.onyphe.io/)
[Binary Edge - Scans the internet for threat intelligence] :: (https://www.binaryedge.io/)
[IntelligenceX - Search Tor, I2P, data leaks, domains, and emails] :: (https://intelx.io/)
[Project Honey Pot - Community Tracking Online Fraud & Abuse] :: (https://www.projecthoneypot.org/)
[MalwarePatrol - Open Source Threat Data] :: (https://www.malwarepatrol.net/login.php)
[BotScout - Bot Database] :: (http://botscout.com/)
[Shodan - Search Engine of Internet-connected Devices] :: (https://www.shodan.io/)
[GreyNoise - Search for devices connected to the internet] :: (https://www.greynoise.io/)
[Netlas - Search and monitor internet connected assets] :: (https://netlas.io/)
[Censys.io - Search Engine for Vulnerable Devices] :: (https://www.censys.io/)
[FullHunt - Search and discovery attack surfaces] :: (https://fullhunt.io/)
[OSINT-based Cyber Threat Intelligence Search Engine] :: (https://www.criminalip.io/en)
[GrayHatWarfare - Search public S3 buckets] :: (https://grayhatwarfare.com/)
[ZoomEye - Gather information about targets] :: (https://www.zoomeye.org/)
[Dehashed - View leaked credentials] :: (https://www.dehashed.com/)
[CRT sh - Search for certs that have been logged by CT] :: (https://crt.sh/)
[Wigle - Database of wireless networks, with statistics] :: (https://www.wigle.net/)
[ProjectHoneypot.org - Honeypot Checker] :: (http://www.projecthoneypot.org)
[TaskList.org - List of Windows Processes and Descriptions] :: (http://www.tasklist.org/)
[Manually finding Malware] :: (https://peter.hahndorf.eu/tech/malware.html)
[Mining for Malware] :: (https://www.sans.org/reading-room/whitepapers/malicious/mining-malware-gold-thar-proxy-logs-32959)
[Finding Malware in the Registry] :: (https://malwaretips.com/threads/most-important-areas-in-registry-to-check-for-viruses.38778/)
[MAC Addresses And Protocol Identifiers] :: (http://standards.ieee.org/regauth/oui/oui.txt)
[Port Number Assignments] :: (http://www.iana.org/assignments/port-numbers)
[Trojan Port Assignments] :: (http://www.glocksoft.com/trojan_port.htm)
[Neohapsis Ports List] :: (http://neohapsis.com/neolabs/neo-ports/neo-ports.html)
[IFM - Cisco Password Cracker] :: (http://www.ifm.net.nz/cookbooks/passwordcracker.html)
[XSS Filter Evasion Cheat Sheet] :: (https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet)
[SQL Injection Prevention Cheat Sheet] :: (https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet)
[OpenIOC - Open Framework for Sharing Threat Intelligence] :: (http://www.openioc.org/)
|---[ Forensics / Recovery ]
[Hashbot - A forensic web tool] :: (https://www.hashbot.com/)
[ZIP File Password Removal] :: (https://passwordrecovery.io/zip-file-password-removal/)
[Barcode Decoder Online] :: (https://zxing.org/w/decode.jspx)
[Repair Image Online Tool] :: (https://online.officerecovery.com/pixrecovery/)
|---[ Steganography ]
[AperiSolve - Aperi'Solve is a platform which performs layer analysis on image (open-source)] :: (https://aperisolve.fr/)
[Convert - Convert images b/w formats and apply filters] :: (http://www.imagemagick.org/script/convert.php)
[Image Steganography Online - This is a client-side Javascript tool to steganographically hide images inside the lower "bits" of other images] :: (https://incoherency.co.uk/image-steganography)
[StegOnline - Conduct a wide range of image steganography operations, such as concealing/revealing files hidden within bits (open-source)] :: (https://georgeom.net/StegOnline/upload)
[Steganography Online] :: (https://stylesuxx.github.io/steganography/)
[Steganographic Decoder] :: (https://futureboy.us/stegano/decinput.html)
[CTF Image Steganography Checklist] :: (https://georgeom.net/StegOnline/checklist)
[This cheatsheet is intended to guide CTF players in their research] :: (https://aperisolve.fr/cheatsheet)
|---[ Crypto / Converters ]
[CyberChef - The Cyber Swiss Army Knife] :: (https://gchq.github.io/CyberChef/)
[CacheSleuth - This tool is designed to solve a wide variety of codes and ciphers] :: (https://www.cachesleuth.com/multidecoder/)
[SCWF - Solve Crypto with Force!] :: (https://scwf.dima.ninja/)
[BIN, HEX, DEC, BASE64 Translator] :: (https://paulschou.com/tools/xlate/)
[FeatherDuster] :: (https://github.com/nccgroup/featherduster)
[Base64 Encode] :: (https://www.base64encode.org/)
[Base64 Decode] :: (https://www.base64decode.org/)
[Cryptii - Converter between multiple format systems] :: (https://cryptii.com/text/select)
[dCode - The Ultimate Toolkit to Solve Games & Riddles] :: (https://www.dcode.fr/tools-list)
[Hash Extender - Perform hash length extension attacks] :: (https://github.com/iagox86/hash_extender)
[QuipQuip - Break substitution ciphers or vigenere ciphers (without key)] :: (https://quipqiup.com)
[PlanetCalc - Substitution cipher decoder] :: (https://planetcalc.com/8047/)
[RSACTFTool - Recover RSA private key with various attacks] :: (https://github.com/Ganapati/RsaCtfTool)
[RSATool - Generate private key with knowledge of p and q] :: (https://github.com/ius/rsatool)
[XORTool - Analyze multi-byte xor ciphers] :: (https://github.com/hellman/xortool)
[AES - Symmetric Ciphers Online] :: (http://aes.online-domain-tools.com/)
[ASCII Converter (Hex/Dec/Bin/Base64/ASCII)] :: (https://www.branah.com/ascii-converter)
[Hex Dec Bin Oct converter for programmers] :: (http://calc.50x.eu/)
[Rot13 Converter] :: (http://www.rot13.com/)
[Hex to ASCII Text Converter] :: (https://www.rapidtables.com/convert/number/hex-to-ascii.html)
[Number Base Converter] :: (https://www.rapidtables.com/convert/number/index.html)
[URL Encoding] :: (http://www.blooberry.com/indexdot/html/topics/urlencoding.htm)
[URL Encode/Decode] :: (http://www.url-encode-decode.com/)
[Online Encrypt Decrypt String] :: (https://codebeautify.org/encrypt-decrypt)
[Cipher Tools] :: (http://rumkin.com/tools/cipher/)
[Reverse String] :: (https://codebeautify.org/reverse-string)
[Morse Code Translator] :: (https://morsecode.scphillips.com/translator.html)
[Morse Code Table Cheat Sheet] :: (https://terablitz.com/radio/morse-code-table-cheat-sheet/)
[Maritime Signals Code] :: (https://www.dcode.fr/maritime-signals-code)
[Convert Coordinates - Calculate a position in a variety of formats] :: (https://www.earthpoint.us/convert.aspx)
[Universal Leet (L337, L33T, 1337) Converter] :: (https://www.robertecker.com/hp/research/leet-converter.php)
[dCode - Symbols Cipher List] :: (https://www.dcode.fr/symbols-ciphers)
|---[ Binary Exploitation / Coding ]
[Compiler Explorer Online] :: (https://godbolt.org/)
[Online GDB] :: (https://www.onlinegdb.com/)
[Try It Online (TIO) - Online Interpreter] :: (https://tio.run/)
[Compile and Execute Assembly Online] :: (https://www.tutorialspoint.com/compile_assembly_online.php)
[Online Terminals, Compilers & Interpreters] :: (http://www.tutorialspoint.com/codingground.htm)
[Execute Python Online (Python v2.7.13)] :: (https://www.tutorialspoint.com/execute_python_online.php)
[Python 3 Terminal Online] :: (https://www.tutorialspoint.com/python3_terminal_online.php)
[Execute Ruby Online (Ruby v2.4.1)] :: (https://www.tutorialspoint.com/execute_ruby_online.php)
[PowerShell Terminal Online] :: (https://www.tutorialspoint.com/powershell_terminal_online.php)
[Python Decompiler] :: (https://python-decompiler.com/)
[Esoteric Languages (ESO Lang) Wiki] :: (https://esolangs.org/wiki/language_list)
[Hello world!] :: (https://esolangs.org/wiki/Hello_world)
[Hello world in Esoteric languages] :: (https://esolangs.org/wiki/Hello_world_program_in_esoteric_languages)
[The Hello World Collection] :: (http://helloworldcollection.de/)
[Search code] :: (https://searchcode.com/)
[Grep App - Search git repos] :: (https://grep.app/)
|---[ Reversing ]
[32-bit Opcode Reference] :: (http://ref.x86asm.net/coder32.html)
[64-bit Opcode Reference] :: (http://ref.x86asm.net/coder64.html)
[Intel x86 Assembler Instruction Set Opcode Table] :: (http://sparksandflames.com/files/x86InstructionChart.html)
[ODA - The Online Disassembler] :: (https://www.onlinedisassembler.com/odaweb/)
[Online TrID] :: (http://mark0.net/onlinetrid.aspx)
[Executable Online Viewer] :: (https://exe.urih.com/)
[Visual Analysis of Binary Files] :: (https://binvis.io/#/)
[Online Strings Utility] :: (https://www.fileformat.info/tool/strings.htm)
[File Signatures] :: (http://www.garykessler.net/library/file_sigs.html)
[Wotsit.org - The Programmer's File & Data Resource] :: (http://devel.archefire.org/mirrors/www.wotsit.org/)
[FileFormat.Info - The Digital Rosetta Stone] :: (http://www.fileformat.info/)
[Zamzar - File formats descriptions and meanings] :: (http://www.zamzar.com/fileformats/)
[File Magic Numbers] :: (https://gist.github.com/leommoore/f9e57ba2aa4bf197ebc5)
[Magic Bytes - JavaScript Library] :: (https://github.com/LarsKoelpin/magic-bytes)
[HexEd.it - Browser based hex editor] :: (https://hexed.it/)
|---[ Malware Analysis ]
[VirusTotal - Virus, Malware and URL Scanner] :: (http://www.virustotal.com)
[PolySwarm - Scan files for threats] :: (https://polyswarm.io/)
[VirSCAN.org] :: (http://virscan.org/)
[Jotti's Malware Scan] :: (https://virusscan.jotti.org/en)
[Deepviz Malware Analyzer] :: (https://sandbox.deepviz.com/)
[Malware Analysis by Malwr.com] :: (https://malwr.com/)
[NoDistribute - Online Virus Scanner w/o Distribution] :: (http://nodistribute.com/)
[CyberTracker - MalwareHunterTeam] :: (http://cybertracker.malwarehunterteam.com/)
[Advanced File Analysis] :: (https://valkyrie.comodo.com/)
[Static Analysis Framework] :: (https://mastiff-online.korelogic.com/)
[ThreatExpert File Analysis] :: (http://www.threatexpert.com/submit.aspx)
[Microsoft Malware Protection Center] :: (https://www.microsoft.com/en-us/security/portal/submission/submit.aspx)
[Hybrid-Analysis - Malware/File Analysis] :: (https://www.hybrid-analysis.com/)
[Reverse.IT - Malware/File Analysis] :: (https://www.reverse.it)
[File Analyzer] :: (https://www.file-analyzer.net/)
[Document Analyzer] :: (http://www.document-analyzer.net/)
[Office Document Malware Analysis] :: (https://www.quicksand.io/)
[Scan Documents for Embedded Executables/Payloads] :: (https://www.cryptam.com/)
[Malware Tracker aka PDF-Examiner] :: (https://www.malwaretracker.com/pdf.php)
[APK Analyzer] :: (https://www.apk-analyzer.net/)
[Linux Sandbox] :: (https://detux.org/)
|---[ Additonal Tools ]
Type |
ASCII Signature |
HEX Signature |
CAB |
MSCF |
4D 53 43 46 |
CLASS |
Êþº¾ |
CA FE BA BE |
DEB |
!<arch>. |
21 3C 61 72 63 68 3E |
EXE |
MZ |
4D 5A |
ELF |
.ELF |
7F 45 4C 46 |
NES |
NES |
4E 45 53 1A |
RPM |
í«îÛ |
ED AB EE DB |
BMP |
BM |
42 4D |
GIF |
GIF89a |
47 49 46 38 39 61 |
ICO |
.... |
00 00 01 00 |
JPG |
ÿØÿà..JFIF.. |
FF D8 FF E0 00 10 4A 46 49 46 00 01 |
PNG |
.PNG.... |
89 50 4E 47 0D 0A 1A 0A |
WEBP |
WEBP |
57 45 42 50 |
FLAC |
fLaC |
66 4C 61 43 |
MIDI |
MThd |
4D 54 68 64 |
MP3 |
ÿû |
FF FB |
OGG |
OggS |
4F 67 67 53 |
WAV |
WAVE |
57 41 56 45 |
AVI |
AVI. |
41 56 49 20 |
MKV |
.Eߣ |
1A 45 DF A3 |
MPG |
.... |
00 00 01 BA |
PDF |
%PDF- |
25 50 44 46 2d |
RTF |
{\rtf1 |
7B 5C 72 74 66 31 |
UTF |
 |
EF BB BF |
XML |
<?xml |
3c 3f 78 6d 6c 20 |
ISO |
CD001 |
43 44 30 30 31 |
7z |
7z¼¯' |
37 7A BC AF 27 1C |
LZ4 |
."M. |
04 22 4D 18 |
RAR |
Rar!.... |
52 61 72 21 1A 07 01 00 |
TAR |
ustar.00 |
75 73 74 61 72 00 30 30 |
TAR.GZ |
.. |
1F 8B |
TAR.XZ |
²7zXZ.. |
FD 37 7A 58 5A 00 00 |
TAR.Z |
.. |
1F A0 |
XAR |
xar! |
78 61 72 21 |
ZIP |
PK.. |
50 4B 03 04 |
CAP |
4Ͳ¡ |
34 CD B2 A1 |
PCAP |
¡²ÃÔ |
A1 B2 C3 D4 |
PCAP |
Ôò¡ |
D4 C3 B2 A1 |
PCAPNG |
.... |
0A 0D 0D 0A |
Letter |
Morse |
Digit |
Morse |
Punctuation Mark |
Morse |
A |
• – |
0 |
– – – – – |
Full–stop (period) |
• – • – • – |
B |
– • • • |
1 |
• – – – – |
Comma |
– – • • – – |
C |
– • – • |
2 |
• • – – – |
Colon |
– – – • • • |
D |
– • • |
3 |
• • • – – |
Question mark (query) |
• • – – • • |
E |
• |
4 |
• • • • – |
Apostrophe |
• – – – – • |
F |
• • – • |
5 |
• • • • • |
Hyphen |
– • • • • – |
G |
– – • |
6 |
– • • • • |
Slash ("/") |
– • • – • |
H |
• • • • |
7 |
– – • • • |
Brackets (parentheses) |
– • – – • – |
I |
• • |
8 |
– – – • • |
Quotation marks |
• – • • – • |
J |
• – – – |
9 |
– – – – • |
At sign |
• – – • – • |
K |
– • – |
|
|
Equals sign |
– • • • – |
L |
• – • • |
M |
– – |
N |
– • |
O |
– – – |
P |
• – – • |
Q |
– – • – |
R |
• – • |
S |
• • • |
T |
– |
U |
• • – |
V |
• • • – |
W |
• – – |
X |
– • • – |
Y |
– • – – |
Z |
– – • • |
Number |
Letter |
1 |
- |
2 |
A B C |
3 |
D E F |
4 |
G H I |
5 |
J K L |
6 |
M N O |
7 |
P Q R S |
8 |
T U V |
9 |
W X Y Z |
0 |
- |
Copyright © 1984-2025 foOzeRk Designed by xD. (òÓ,)_\,,/