Skip to content

ZeroTrace OSINT

Utilities & Decoders

The day-to-day utility tools — encoders, decoders, defangers, timestamp converters, URL tools, user-agent parser, paste-site search.

The Utilities discipline is the swiss-army-knife category. Each tool here is small, fast, and the right answer for a specific cheap operation an investigator runs many times a day.

What's in this section

ToolWhat it does
Encoders & decodersBase64, hex, JSON, port reference, CIDR — the conversion utilities
JWT decoderHeader / payload / signature parsing, signature verify, alg-confusion warning
DefangDefang and refang IOCs in multiple formats (CyberChef, MISP, STIX)
TimestampsUnix / UTC / local / ISO / Windows FILETIME / Apple Cocoa / LDAP / WebKit conversions
URL toolsURL parser, URL analyzer with suspicion scoring, IDN homograph detection
User-agent parserBrowser / engine / OS / device / bot identification with version staleness
Pastebin searchCross-source search of pastebin sites and Github gists

Every tool in this section supports bulk-paste mode. Many investigations boil down to "convert this column from X to Y for two thousand rows" — bulk paste turns that from a task into a moment.

Common starting points

You have...Best first tool
A base64 string of unknown contentEncoders & decoders (auto-detect mode)
A JWT from a log lineJWT decoder
A URL or IP about to be shared in a chatDefang
A weird Unix timestampTimestamps
A URL you want to dissectURL tools
A user-agent string from a logUser-agent parser
A leaked secret you suspect ended up on a paste sitePastebin search

Command Palette

Search for a command to run...