// artifact family

hex & binary

8 browser-only forensics tools in this catalog group — browse by artifact family when you know the kind of evidence you are working with, not the investigation pattern.

tools
8
catalog slugs
8
processing
local · in browser

tools in this family

ordered as in the forensics catalog. every tool runs locally — no upload, no account.

  1. raw hex editorfull hex editor in the browser · navigate by offset · search bytes or ASCII · edit and export · interprets known headers · runs locally
  2. hex diffdrop two binary files · see exactly which bytes differ · offset · old value · new value · runs locally
  3. binary stringsextract readable strings from any binary · ASCII · UTF-16 · minimum length filter · export · runs locally
  4. suspicious string clustererdrop binary or memory dump · extract ASCII + UTF-16 strings · cluster by context · flag C2 patterns · URLs · IPs · registry paths · base64 blobs · export CSV · runs locally
  5. string deobfuscatorpaste obfuscated text or drop a binary · auto-detect and decode XOR · ROT13 · base64 · hex · reverse · stacked layers · runs locally
  6. xor key finderdrop or paste binary data · brute-force XOR keys 1-32 bytes · score by printable output · preview decrypted result · runs locally
  7. base64 mass decoderdrop any file or paste text · detect and decode all base64 blobs · recursive decoding · hex decode · URL decode · PowerShell gzip · reveal hidden payloads · runs locally
  8. cipher identifierpaste ciphertext or encoded data · identify base64 · hex · XOR · caesar · vigenere · rot13 · morse · and more · runs locally
ready