You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Why did I make the README all flashy and buzzwordy, that's bad! This is probably the remains of the time I used to work in SEO and all those shenanigans. Being overenthusiastic is not good on the Internet. This commit shows I learned to change.
**BaseCrack** is a tool written in Python that can decode all alphanumeric base encoding schemes. This tool can accept single user input, multiple inputs from a file, input from argument, **multi-encoded bases**, **bases in image EXIF data**, **bases on images with OCR** and decode them incredibly fast.
17
9
18
-
Decode Base16, Base32, Base36, Base58, Base62, Base64, Base64Url, Base85, Ascii85, Base91, Base92 and more with the best base encoding scheme decoding tool in town. It's useful for **CTFs**, **Bug Bounty Hunting**, and **Cryptography** (**NOTE:** Base Encoding is not an "Encryption" hence it doesn't fall under the Cryptography category, it's useful as base scheme encoding are often used in cryptography tools/projects/challenges).
19
-
20
10
<details>
21
-
<summary>Fun Fact!</summary>
22
-
<br>
23
-
I initially made this after being fed up with lame AF CTF challenges with multi-encoded bases in Cryprography challenges and now some of them started doing that in Steganography challenges so I automated that too smh!
11
+
<summary><strong>Fun Fact!</strong></summary>
12
+
<br>
13
+
I initially made this after being fed up with lame CTF challenges with multi-encoded bases. Now some of them started doing that in Steganography challenges as well so I automated that too smh!
24
14
</details>
25
15
26
-
---
27
-
28
-
### Jump to [Usage](https://github.com/mufeedvh/basecrack#usage)
29
-
30
-
---
31
-
32
-
## Changelog
33
-
34
-
**What's new in v3.0:**
35
-
36
-
-**Decode bases in image EXIF data.** 📸
37
-
-**Decode bases on images with OCR detection.** 🔎
38
-
- Better Accuracy. (+added charset validation along with replacement char checks) 💯
39
-
- Magic Mode now works with File Read mode. :fire:
40
-
- Magic Mode now works with Wordlist Generator. :fire:
41
-
42
-
**What's new in v2.0:**
43
-
44
-
- Now BaseCrack supports both Python2 and Python3.
45
-
46
-
## Magic Mode 🪄
47
-
48
-
Now you can **decode multi-encoded bases** of any pattern in a single shot.
49
-
50
-
Have you ever stumbled upon that one lame CTF challenge that gives you an encoded string which is just encoded over and over with Base64, Base91, Base85 and so on? Just give that to BaseCrack and you're done with it! ;)
📝 **NOTE:** I haven't completely tested this tool on Windows so if you stumble upon any issues, please [open an issue](https://github.com/mufeedvh/basecrack/issues/new).
75
+
**NOTE:** I haven't completely tested this tool on Windows so if you stumble upon any issues, please [open an issue](https://github.com/mufeedvh/basecrack/issues/new).
124
76
125
77
## Usage
126
78
127
79
Get a list of all the arguments:
128
80
129
-
python basecrack.py -h
81
+
python3 basecrack.py -h
130
82
131
83
To decode a single base encoding from user input:
132
84
133
-
python basecrack.py
85
+
python3 basecrack.py
134
86
135
87
To decode a single base encoding from argument **(-b/--base)**:
136
88
137
-
python basecrack.py -b SGVsbG8gV29ybGQh
89
+
python3 basecrack.py -b SGVsbG8gV29ybGQh
138
90
139
91
To decode multiple base encodings from a file **(-f/--file)**:
140
92
141
-
python basecrack.py -f file.txt
93
+
python3 basecrack.py -f file.txt
142
94
143
95
**Magic Mode:** To decode multi-encoded base of any pattern **(-m/--magic)**:
144
96
145
-
python basecrack.py --magic
97
+
python3 basecrack.py --magic
146
98
147
99
To input an image for **EXIF/OCR** detection mode **(-i/--image)**:
148
100
149
-
python basecrack.py -i image.jpg (--exif/--ocr)
101
+
python3 basecrack.py -i image.jpg (--exif/--ocr)
150
102
151
-
**EXIF Data Detection:** To decode bases in image EXIF data **(-e/--exif)**:
103
+
**EXIF Data:** To decode bases in image EXIF data **(-e/--exif)**:
152
104
153
105
python basecrack.py -i image.jpg --exif
154
106
@@ -159,6 +111,26 @@ To input an image for **EXIF/OCR** detection mode **(-i/--image)**:
159
111
To generate a wordlist/output with the decoded bases **(-o/--output)**:
Now you can **decode multi-encoded bases** of any pattern in a single shot.
118
+
119
+
Have you ever stumbled upon that one lame CTF challenge that gives you an encoded string which is just encoded over and over with Base64, Base91, Base85 and so on? Just give that to BaseCrack and you're done with it! ;)
@@ -233,10 +185,6 @@ Licensed under the MIT License, see <a href="https://github.com/mufeedvh/basecra
233
185
## Liked the project?
234
186
Support the author by buying him a coffee!
235
187
236
-
<ahref="https://www.buymeacoffee.com/mufeedvh"target="_blank"><imgsrc="https://cdn.buymeacoffee.com/buttons/default-orange.png"alt="Buy Me A Coffee"height="51px"width="217px"></a>
237
-
238
-
------------
188
+
<ahref="https://www.buymeacoffee.com/mufeedvh"target="_blank"><imgsrc="https://cdn.buymeacoffee.com/buttons/default-orange.png"alt="Buy Me A Coffee"height="45"width="170"></a>
239
189
240
-
***Support this project by starring ⭐, sharing 📲, and contributing 👩💻! :heart:***
0 commit comments