Decode Layers
Automatically detect and decode multiple encoding layers (Base64, URL, Hex).
About Decode Layers
Decode Layers automatically detects and peels back multiple chained encoding layers applied to a string — such as Base64 wrapped inside URL encoding wrapped inside hex — revealing every intermediate step and the final plaintext. The tool recognizes over a dozen common encodings including Base64, URL percent-encoding, hex, HTML entities, Punycode, and more, applying them in the correct order without manual guessing. This makes it invaluable for penetration testers, DFIR analysts, and CTF players who regularly encounter multiply-obfuscated payloads in web traffic, malware samples, or phishing lures.
How to Use
Paste the encoded or obfuscated string into the input field and click Decode — the engine automatically identifies the outermost encoding layer, decodes it, then re-evaluates the result and repeats until no further encoding is detected. Each intermediate decode step is displayed in sequence with the identified encoding type labeled, so you can follow the full transformation chain. Copy any intermediate or final result directly from the step display.
Common Use Cases
- Penetration testers deobfuscating multi-layer encoded payloads found in XSS, SQL injection, or SSRF attack strings intercepted in web application traffic
- DFIR analysts rapidly unwrapping double or triple URL-encoded redirect parameters in phishing URLs to reveal the actual destination or payload domain
- CTF players decoding multi-step encoding challenges where Base64, hex, and ROT13 or similar encodings are stacked in unknown order
- Malware analysts extracting readable strings from encoded shellcode, dropper scripts, or obfuscated command-and-control beacon configurations
- Web developers debugging encoding bugs in OAuth redirect URIs, webhook payloads, or JWT claims that have been accidentally double-encoded by middleware