JJEncode

Global Variable Name
Palindrome

JJEncode is a free online encryption tool that could encode any JavaScript code using only symbols.

Tips:

Using JJEncode for actual attack isn't good idea.

  • Decode easily. It is not utilitarian obfuscation, just an encoder.

  • Too characteristic. Detected easily.

  • Browser depended. The code can't run on some kind of browsers.


Hash and compare text string using Bcrypt. Bcrypt Hash Generator & Verifier could generate and verify Bcrypt hash​ strings.

Bcrypt Hash Generator & Verifier

Hash and compare text string using Bcrypt. Bcrypt Hash Generator & Verifier could generate and verify Bcrypt hash​ strings.
A1Z26 Cipher, is a simple substitution cipher that replaces each letter of the alphabet with its corresponding numerical position in the alphabet.

A1Z26 Cipher

A1Z26 Cipher, is a simple substitution cipher that replaces each letter of the alphabet with its corresponding numerical position in the alphabet.
ADFGVX Cipher is a transposition and substitution cipher used during World War I by the German Army. The name

ADFGVX Cipher

ADFGVX Cipher is a transposition and substitution cipher used during World War I by the German Army. The name "ADFGVX" comes from the six possible letters used in the cipher: A, D, F, G, V, and X.
The ADFGX Cipher is a fractionating transposition cipher which combined a modified Polybius square with a single columnar transposition. It is closely related to the ADFGVX Cipher.

ADFGX Cipher

The ADFGX Cipher is a fractionating transposition cipher which combined a modified Polybius square with a single columnar transposition. It is closely related to the ADFGVX Cipher.