Hex Encode & Decode

Delimiter
Delimiter
Bytes Per Line

Encode: Converts the input string to hexadecimal bytes separated by the specified delimiter.

e.g. The UTF-8 encoded string "A.Tools" becomes "41 2e 54 6f 6f 6c 73"


Decode: Converts a hexadecimal byte string back into its raw value.

e.g. "41 2e 54 6f 6f 6c 73" becomes the UTF-8 encoded string "A.Tools"

References

https://wikipedia.org/wiki/Hexadecimal

Featured Tools

Featured tools that you might find useful.

Popular Tools

List of popular tools that users love and frequently use.

New Tools

The latest tools added to our collection, designed for you.

Topics

The tools grouped by topics to quickly find what you need.
ROT13 Cipher is a simple letter substitution cipher with a specific key where the letters of the alphabet are offset 13 places.

ROT13 Cipher

ROT13 Cipher is a simple letter substitution cipher with a specific key where the letters of the alphabet are offset 13 places.
Simple Substitution Cipher is a cipher that has been in use for many hundreds of years. It basically consists of substituting every plaintext character for a different ciphertext character.

Simple Substitution Cipher

Simple Substitution Cipher is a cipher that has been in use for many hundreds of years. It basically consists of substituting every plaintext character for a different ciphertext character.
Running Key Cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream.

Running Key Cipher

Running Key Cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream.
Straddle Checkerboard Cipher is a substitution cipher, except that the substitutions are of variable length. It has formed a component of several impotant field ciphers, the most notable being the VIC cipher used by russian spies during the cold war.

Straddle Checkerboard Cipher

Straddle Checkerboard Cipher is a substitution cipher, except that the substitutions are of variable length. It has formed a component of several impotant field ciphers, the most notable being the VIC cipher used by russian spies during the cold war.