# CyberChef > Web-based data transformation tool — decode Base64, XOR, hex, decompress, and chain operations **Category:** [[categories/examine-static-properties-deobfuscation|Examine Static Properties > Deobfuscation]] | **Tier:** Rich (FOR610) **Docs:** [https://docs.remnux.org/discover-the-tools/examine+static+properties/deobfuscation](https://docs.remnux.org/discover-the-tools/examine+static+properties/deobfuscation) ## Usage ```bash cyberchef ``` ## Recipes - [[recipes/cyberchef-xor-decode|Visual XOR/Base64 Decode with CyberChef]] ## Workflows - [[workflows/document-analysis-workflow|Malicious Document Analysis]] — Step 5: Payload Decoding - [[workflows/shellcode-analysis-workflow|Shellcode Analysis]] — Step 6: String & IOC Extraction - [[workflows/string-deobfuscation-workflow|String & Data Deobfuscation]] — Step 4: Multi-Byte / Custom Decoding ## Related Tools - [[tools/1768|1768.py]] — Parse Cobalt Strike beacon configuration from shellcode or m - [[tools/balbuzard|balbuzard]] — Extract and deobfuscate patterns from suspicious files. - [[tools/base64dump|base64dump.py]] — Extract and decode Base64-encoded strings from files - [[tools/brxor|brxor.py]] — Brute-force XOR key detection for single-byte XOR-encoded st - [[tools/chepy|chepy]] — Decode and otherwise analyze data using this command-line to ## FOR610 **Labs:** 1.5, 3.8, 3.12 **Sections:** 1, 3 #decoding #encoding #transformation #web-based