e62a14dafc
Generate interlinked wiki from master inventory: 397 tool pages, 15 workflow pages, 27 recipe pages, 33 category pages, plus index. All pages use [[wiki-links]] for cross-navigation between tools, workflows, recipes, and categories (1782 links total). Install zk for interactive browsing with fzf search, tag filtering, and backlink discovery. Add 'fhelp wiki' command and Makefile target. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1.5 KiB
1.5 KiB
base64dump.py
Extract and decode Base64-encoded strings from files
Category: categories/examine-static-properties-deobfuscation | Tier: Rich (FOR610) | Author: Didier Stevens Docs: https://docs.remnux.org/discover-the-tools/examine+static+properties/deobfuscation
Usage
base64dump.py file.txt
base64dump.py file.ps1 -n 10
base64dump.py file.ps1 -s 2 -d
Recipes
- recipes/extract-base64-ps-from-vba
- recipes/multi-stage-base64-gzip
- recipes/base64-xor-shellcode
- recipes/office-full-decode-chain
Workflows
- workflows/document-analysis-workflow — Step 5: Payload Decoding
Related Tools
- tools/1768 — Parse Cobalt Strike beacon configuration from shellcode or m
- tools/balbuzard — Extract and deobfuscate patterns from suspicious files.
- tools/brxor — Brute-force XOR key detection for single-byte XOR-encoded st
- tools/chepy — Decode and otherwise analyze data using this command-line to
- tools/cobalt-strike-configuration-extractor-csce-and-parser — Analyze Cobalt Strike beacons.
FOR610
Labs: 3.4, 4.5 Sections: 3, 4
#base64 #decoding #didier-stevens