A Cybersecurity CTF Cipher Puzzle Generator: Trillions and Trillions Unique Puzzle Combinations To…
A Cybersecurity CTF Cipher Puzzle Generator: Trillions and Trillions Unique Puzzle Combinations To Try
The true skill of the cybersecurity expert is the solving of complex puzzles. And so, I’ve created a puzzle generator system so that we can practice solving cypher puzzles. Overall, I think there are trillions and trillions of permutations of these puzzles:
- 01. ASCII Coding. 01. ASCII. This generates an ASCII to hex mapping.
- 02. Pigpen. 02. Pigpen. This generates a Pigpen challenge.
- 03. Semaphore. 03. Semaphore. This generates a Semaphore challenge.
- 04. Templar. 04. Templar. This generates a Semaphore challenge.
- 05. Braille. 05. Braille. This generates a Semaphore challenge.
- 06. Mary Queen of Scots. 06. Mary Queen of Scots. This generates a Semaphore challenge.
- 07. Dscript. 07. Dscript. This generates a Semaphore challenge.
- 08. Voynich. 08. Voynich. This generates a Semaphore challenge.
- 09. Three-square. 09. Three-square. This generates a Semaphore challenge.
- 10. Gold Bug. 10. Gold Bug. This generates a Semaphore challenge.
- 11. ADFGVX. 11. ADFGVX. This generates an ADFGVX challenge.
- 12. Bacon. 12. Bacon. This generates a Bacon challenge.
- 13. Monk. 13. Monk. This generates a Monk challenge.
- 14. Polybius. 14. Polybius. This generates a Polybius challenge.
- 15. Dvorak. 15. Dvorak. This generates a Dvorak challenge.
- 16. Atbash. 16. Atbash. This generates an Atbash challenge.
- 17. Rot13. 17. Rot13. This generates a Rot13 challenge.
- 18. ROT47 to cipher. 18. ROT47. This generates a ROT47 challenge.
- 19. ROT47 to plaintext. 19. ROT47. This generates a ROT47 challenge.
- 20. Tap. 20. Tap. This generates a Tap challenge.
- 21. Caeser cipher. 21. Caeser cipher. This generates a Caeser cipher challenge.
- 22. Baudot code. 22. Baudot code. This generates a Baudot code challenge.
- 23. Scrambled alphabet . 23. Scrambled alphabet . This generates a Scrambled alphabet challenge.
- 24. Morse code. 24. Morse code. This generates a Homophonic cipher challenge.
- 25. Homophonic cipher. 25. Homophonic cipher. This generates a Homophonic cipher challenge.
- 26. keyword cipher. 26. keyword cipher. This generates a keyword cipher challenge.
- 27. Bifid cipher. 27. Bifid cipher. This generates a Bifid cipher challenge.
- 28. Gray cipher code . 28. Gray cipher code . This generates a Gray cipher code challenge.
- 29. Sudoku puzzle. 29. Sudoku puzzle. This generates a Sudoku puzzle challenge.
- 30. Straddling cipher. 30. Straddling cipher. This generates a Straddling cipher challenge.
- 31. 3-rail code. 31. 3-rail code. This generates a 3-rail code challenge.
- 32. Pollux cipher. 32. Pollux cipher. This generates a Pollux cipher challenge.
- 33. Fractional cipher. 33. Fractional cipher. This generates a Fractional cipher challenge.
- 34. Column cipher . 34. Column cipher. This generates a Column cipher challenge.
- 35. 10 cipher related words in a grid. 35. 10 cipher related words in a grid. This generates 10 cipher related words in a grid challenge.
- 36. 15 cipher related words in a larger grid. 36. Cipher related words in a larger grid. This generates 15 cipher related words in a grid challenge.
- 37. Four Square cipher . 37. Cipher related words in a larger grid. This generates a Four Square cipher.
- 38. exponential cipher. 38. exponential cipher. This generates 15 cipher related words in a grid challenge.
- 39. Diffie Hellman . 39. Diffie Hellman. This generates 15 cipher related words in a grid challenge.
- 40. Multiplication cipher. 40. Multiplication cipher. This generates a Multiplication cipher challenge.
- 41. LZ coding. 41. LZ coding. This generates an LZ codingchallenge.
- 42. Huffman cipher . 42. Huffman cipher . This generates a Huffman cipher challenge.
- 43. EX-OR the message with a one-time key . 43. EX-OR the message with a one-time key . This generates a EX-OR the message with a one-time key challenge.
- 44. Jump cipher . 44. jump cipher . This generates a jump cipher challenge.
- 45. Affine cipher. 45. Affine cipher. This generates an Affine Cipher.
- 46. Next value. 46. Next value. This generates a next value sequence.
- 47. Next value. 47. Next value. This generates a next value sequence.
- 48. Next value (letters). 48. Next value (letters). This generates a next value sequence for letters./li>
- 49. Next value in sequence of primes. 49. Next value in sequence of primes. This generates a next value sequence for primes.
- 50. Next value in sequence of Hex. 50. Next value in sequence of hex. This generates a next value sequence for hex values.
- 51. Next in sequence of Octal. 51. Next in sequence of Octal. Next in sequence of Octal.
- 52. Next in sequence of Greek alphabet . 52. sequence of Greek alphabet . Next in sequence of Greek alphabet .
- 53. SYLLABARY cipher. 53. SYLLABARY cipher. This generates a SYLLABARY cipher.
- 54. Quadratic . 54. Quadratic. This generates a Quadratic secret.
- 55. Encryption ring. 55. Encryption ring. This generates an Encryption ring.
- 56. Blum Blum Shub. 56. Blum Blum Shub. This generates a Blum Blum Shub sequence.
- 57. Condi cipher. 57. Condi cipher. This generates a Condi cipher.
- 58. Condi cipher. 58. Condi cipher. This generates a Condi cipher.
- 59. AMSCO encode. 59. AMSCO encode. This generates a AMSCO encode cipher.
- 60. AMSCO cipher decode. 60. AMSCO cipher decode. This generates a AMSCO decode cipher.
- 61. NULL cipher. 61. NULL cipher. This generates a NULL cipher.
- 62. Vigenère cipher. 62. Vigenère cipher. This generates a Vigenère cipher.
- 63. Porta cipher. 63. Porta cipher. This generates a Porta cipher.
- 64. Columnar transposition . 64. Columnar transposition. This generates a Columnar transposition cipher.
- 65. Beaufort cipher. 65. Beaufot cipher. This generates a Beaufort cipher.
- 66. XOR. 66. XOR. This generates an XOR cipher.
- 67. S-box cipher. 67. S-box cipher. This generates a Condi cipher.
- 68. Encode cipher. 68. Encode cipher. This generates a Condi cipher.
- 69. Beale Cipher. 69. Beale cipher. This generates a Beale cipher.
- 70. GCD (Great Common Divisor) . 70. GCD. This generates a GCD challenge.
- 71. Delastelle cipher. 71. Delastelle cipher. This generates a Delastelle cipher.
- 72. Nilist cipher. 72. Nilist cipher. This generates a Nilist cipher.
- 73. Navajo cipher. 73. Navajo cipher. This generates a Porta cipher.
- 74. Binary multiplication (modulo 2). 74. Binary multiplication (modulo 2). This generates a Binary multiplication (modulo 2) cipher.
- 75. Mod 2 cipher. 75. Msod 2 cipher. This generates a Mod 2 cipher.
- 76. RSA. 76. RSA cipher. This generates an RSA cipher.
- 77. RSA cipher. 77. RSA cipher. This generates an RSA cipher.
I’m adding more, so watch this space: