βββββββ βββββββ βββ ββββββββββββ βββββββ βββββββ βββ
ββββββββββββββββ βββ βββββββββββββββββββββββββββββββββ
βββββββββββ ββββββββββββ βββ βββ ββββββ ββββββ
βββββββββββ βββββββββββ βββ βββ ββββββ ββββββ
βββββββββββββββββ βββ βββ ββββββββββββββββββββββββββ
βββββββ βββββββ βββ βββ βββββββ βββββββ ββββββββMulti-format encoding/decoding CLI with recursive layer detection for security analysis.
This is a quick overview β security theory, architecture, and full walkthroughs are in the learn modules.
- Encode and decode Base64, Base64URL, Base32, Hex, and URL formats
- Auto-detect encoding format with confidence scoring
- Peel command recursively strips multi-layered encoding (WAF bypass analysis)
- Chain multiple encoding steps to test obfuscation patterns
- Pipeline-friendly output for integration into security workflows
uv tool install b64tool
b64tool encode "Hello World"Tip
This project uses just as a command runner. Type just to see all available commands.
Install: curl -sSf https://just.systems/install.sh | bash -s -- --to ~/.local/bin
| Command | Description |
|---|---|
b64tool encode |
Encode text into Base64, Base64URL, Base32, Hex, or URL format |
b64tool decode |
Decode encoded text back to plaintext |
b64tool detect |
Auto-detect the encoding format with confidence scoring |
b64tool peel |
Recursively strip multi-layered encoding to reveal original data |
b64tool chain |
Chain multiple encoding steps together for obfuscation testing |
This project includes step-by-step learning materials covering security theory, architecture, and implementation.
| Module | Topic |
|---|---|
| 00 - Overview | Prerequisites and quick start |
| 01 - Concepts | Security theory and real-world breaches |
| 02 - Architecture | System design and data flow |
| 03 - Implementation | Code walkthrough |
| 04 - Challenges | Extension ideas and exercises |
AGPL 3.0