• Phonetic Alphabet

    Yankee Hotel Foxtrot

  • Password Generator

    passwd1

    passwd2

  • chmod

    rwx | r-x | r-x

    Owner | Group | Others

  • RAID Caculator




    RAID 0: 112 TB or 112000 GB

    RAID 1: NA

    RAID 5: 104 TB or 104000 GB

    RAID 6: 96 TB or 96000 GB

    RAID 10: 56 TB or 56000 GB

  • Subnet Calculator

    IP Address: 192.0.2.25

    Subnet Mask: 255.255.255.0

    Wildcard Mask: 0.0.0.255

    CIDR Bits: 24

    Number of Hosts: 254

    Network Address: 192.0.2.0

    Broadcast Address: 192.0.2.255

  • PsExec

    psexec64 -accepteula \\%host% cmd /c "%cmd%" 2>nul

    psexec64 -accepteula \\%host% cmd /c "quser" 2>nul

  • Enigma

    Cyphertext

    Text

  • Cisco Type 7 Reverser

    Reversed Password

  • Chocolatey






    choco install %software% -a

    psexec64 -accepteula \\%host% cmd /c "choco install %software% -a"

  • Dice







    D4 Rolls: 0

    D6 Rolls: 0

    D8 Rolls: 0

    D10 Rolls: 0

    D12 Rolls: 0

    D20 Rolls: 0

    Roll Total: 0

  • Morse

    ... --- ...

  • Stardate

    2222.77

  • MD5


    MD5:

    HMAC-MD5:

  • SHA1


    SHA1:

    HMAC-SHA1:

@"%SystemRoot%\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -InputFormat None -ExecutionPolicy Bypass -Command " [System.Net.ServicePointManager]::SecurityProtocol = 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))" && SET "PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin"

psexec64 -accepteula \\%host% cmd /c "@"%SystemRoot%\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -InputFormat None -ExecutionPolicy Bypass -Command " [System.Net.ServicePointManager]::SecurityProtocol = 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1'))" && SET "PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin"" 2>nul