Skip to main content

All Tools

Browse every tool on CacheSleuth, organized by category.

Map Tools 18

Top ↑
Coordinate Converter

Convert geocoordinates between Decimal Degrees, DDM, DMS, UTM, MGRS, Plus Codes, Geohash, Maidenhead, Reverse Wherigo, and many more, with map links and elevation lookup.

Reverse Wherigo (Waldmeister)

Calculate coordinates from Waldmeister Reverse Wherigo codes, or create codes from cache coordinates.

Reverse Wherigo (day1976)

Calculate coordinates from day1976 Reverse Wherigo codes, or create codes from cache coordinates.

Distance & Midpoint

Calculate the distance, bearing, and midpoint between two GPS coordinates in common geocaching coordinate formats.

Projection

Project a waypoint from a GPS coordinate using a bearing and distance, then view the projected point and midpoint.

Incomplete Coords

Find possible geocache coordinates when one to three digits are missing from a DDM coordinate.

Batch Convert Coords

Batch convert GPS coordinates between DDM, DD, DMS, UTM, MGRS, Plus Code, Reverse Wherigo, OSGB, GeoHex, Geo3x3, Maidenhead, NAC, Geohash, Mercator, and antipode.

Map Coordinates List

Map a list of GPS coordinates and calculate segment and total distances between points.

2 Circles Intersect

Calculate the intersection points of two circles from center coordinates and radii.

3 Circles Intersect

Calculate the intersection point of three circles from center coordinates and radii.

Circle 3 Points

Calculate the center point and radius of a circle passing through three GPS coordinates.

Center of Triangle

Calculate the center, area, and perimeter of a triangle defined by three GPS coordinates.

Triangulation

Find an unknown point using two known coordinate points and a bearing from each.

Line Circle Intersect

Calculate where a line defined by two GPS points intersects a circle defined by a center point and radius.

2 Lines Intersect

Find where two bearing lines intersect using two known coordinate points and a bearing from each.

Point Bearing to Line

Calculate the intersection of a bearing projected from one coordinate point with a line segment defined by two other coordinate points.

4 Points Intersect

Find where two geodesic lines intersect. Lines are drawn from A to B and C to D.

Cache Placement Helper

Enter coordinates or use your current location to drop a draggable pin on the map. Click the map to reposition the pin.

Code Tables 3

Top ↑

Cipher Tools 48

Top ↑
Additive

Add a numeric key to each letter's position to shift it — a classical generalization of Caesar where the shift can vary per character. Custom alphabets supported.

ADFGX

German WWI field cipher (1918) combining a 5×5 Polybius square (using only ADFGX as coordinates, easy to send by Morse) with a keyword-based columnar transposition.

ADFGVX

Successor to ADFGX with a 6×6 square that includes digits 0–9. Used by the German army in 1918 until cracked by French cryptanalyst Georges Painvin.

Affine

Each letter's position is multiplied by one key, then offset by another, modulo 26 — the affine map of monoalphabetic ciphers. Caesar is the special case where the multiplier is 1.

Albam

Hebrew kabbalistic substitution cipher that splits the alphabet in half and swaps the corresponding letters of the two halves. A close cousin of Atbash.

ASCII-85

ASCII-85 and Base85 encoder and decoder for converting text to and from Adobe-style ASCII85.

Atbash

Hebrew substitution cipher that reverses the alphabet — A↔Z, B↔Y, C↔X — appearing in the Book of Jeremiah. The simplest reciprocal cipher.

Autokey

Polyalphabetic Vigenère variant that extends the keyword with the plaintext (or ciphertext) itself, so the running key never repeats. Configurable alphabets and keyword.

Bacon

Francis Bacon's 1605 binary cipher hides a message inside an apparently innocent text using two letterforms (or two typefaces) per letter. Includes Bacon's distinct and merged variants plus puzzle-style key options.

Beaufort

Reciprocal Vigenère variant where the same operation encrypts and decrypts. Named after Admiral Sir Francis Beaufort, who based it on Giovanni Sestri's earlier work.

Variant Beaufort

Close cousin of Beaufort that reverses the subtraction direction (key minus plaintext). Used on Confederate-era cipher disks during the American Civil War.

Bifid

Felix Delastelle's fractionating cipher: each letter splits into two coordinates on a 5×5 Polybius square, coordinates are interleaved across a period, and read back as new letters.

Burrows-Wheeler

Reversible block-sorting transform that rearranges text into runs of similar letters. Used inside the bzip2 compressor and as a puzzle scrambler that decodes cleanly back.

Caesar Box

Simple transposition that writes the plaintext into a rectangular grid row by row, then reads it back column by column. Quick to spot when text length is a perfect square.

Carbonaro

Italian 19th-century swap cipher used by the Carbonari secret society in the lead-up to Italian unification, pairing letters around a central pivot.

Chaocipher

John F. Byrne's 1918 two-disk cipher in which both alphabets permute themselves after every letter. Byrne offered cash prizes for breaking it; the algorithm wasn't published until 2010.

Columnar Transposition

Plaintext is written into a grid below a keyword, then read out column by column in the order given by the keyword's letter ranks. Configurable padding and alphabet.

Double Transposition

Columnar transposition applied twice with two different keywords. Used by Allied and Axis intelligence services through World War II for medium-grade traffic.

Enigma (M3)

German WWII rotor machine simulator: pick rotors I–VIII, set ring positions, choose a reflector, and define plugboard pairs. The same settings encrypt and decrypt.

Foursquare

Felix Delastelle's digraph cipher that operates on letter pairs using four 5×5 squares — two filled with a keyed alphabet, two with the standard alphabet.

Fractionated Morse

Plaintext is converted to Morse, regrouped in threes (with separators), then each three-symbol group is looked up in a keyed alphabet. Used by US forces in World War I.

Gronsfeld

Vigenère with a numeric key (digits 0–9) instead of a letter keyword — each plaintext letter shifts by the matching digit. Supports autokey mode and custom alphabets.

Hill

Lester Hill's 1929 polygraphic cipher: plaintext blocks are multiplied by a 2×2 matrix key modulo 26, the first cipher to operate on more than three letters at a time.

Kamasutra

One of the earliest substitution ciphers, described in the 4th-century Sanskrit Kama Sutra. The 26 letters are paired so each letter encrypts to its partner and vice versa.

Keyboard Cipher

Shift each letter to a neighbor on a physical keyboard layout — left, right, up, or down. Supports QWERTY, AZERTY, and QWERTZ layouts.

Keyed Caesar

Caesar shift built on a keyed alphabet: the keyword's unique letters appear first, then the rest of the alphabet, and the whole thing is rotated.

Multiplicative

Each plaintext letter's position is multiplied by a key (coprime with 26) modulo 26 — a close cousin of Caesar that scrambles instead of just shifting.

Nihilist

Russian Nihilist cipher combining a Polybius square with a numeric keyword. Each plaintext letter and each keyword letter are converted to two-digit Polybius coordinates and added together to produce the ciphertext.

One Time Pad

The only mathematically unbreakable cipher when the key is truly random, as long as the message, and used exactly once. Generate a fresh pad or supply your own.

Pizzini

Italian Renaissance cipher developed by Pope Innocent X's secretary Matteo Argenti and named after the Pizzini family — letters map to numbered positions in a keyed grid.

Playfair

Charles Wheatstone's 1854 digraph cipher worked on letter pairs using a keyed 5×5 grid. Adopted by the British in the Boer War and World War I.

Pollux

Morse-based cipher in which dots, dashes, and separators are each replaced by one of several substitute characters, masking the underlying Morse pattern.

Polybius Square

Each letter is encoded as the row/column coordinates of its position in a 5×5 (letters) or 6×6 (letters + digits) grid. Supports keyed alphabets and custom coordinate labels.

Porta Key

Giovanni Battista della Porta's 1563 reciprocal polyalphabetic cipher. The keyword chooses one of 13 alphabet pairings, and the same operation encrypts and decrypts.

Rail Fence

Write the plaintext zig-zagging down and up across a chosen number of rails, then read it off row by row. Configurable rail count and starting offset.

Rot / Caesar

Shift each letter by a chosen amount, with one-click presets for ROT13, ROT5, ROT18, and ROT47 covering letters, digits, and the full printable ASCII range.

Rotation Grid

Rotate text written into a grid 90° left or right — handy for puzzle text laid out in non-standard reading orders. Configurable column count and padding.

Rot Special

Caesar-style rotation that lets you choose exactly which characters get shifted and which pass through untouched. Useful for puzzles that mix cipher and plain text.

Route Transposition

Writes the plaintext into a grid and reads it back along a chosen path — spiral, diagonal, or zig-zag — instead of plain columns.

Running Key

Vigenère-style cipher where the key is a long passage of natural text (a book, a poem) rather than a short repeated keyword, defeating standard Kasiski analysis.

Scytale

Ancient Spartan transposition cipher: text wrapped around a cylinder of a specific diameter, then unwrapped, scrambles into a regular column rotation.

Straddle Checkerboard

Soviet-era fractionating cipher mapping common letters to single digits and rare ones to two-digit codes. Often used as an additive over a one-time pad in VIC-style ciphers.

Substitution

Map each plaintext letter to a custom target letter using a keyed alphabet — the foundation under almost every monoalphabetic cipher in this list.

Trifid

Felix Delastelle's three-dimensional extension of Bifid. Each letter gets three coordinates from a 27-character cube, interleaved across a period before being read back.

Trithemius

Johannes Trithemius's 1508 progressive Caesar — each letter shifts by one more than the previous. The first published polyalphabetic cipher and the direct ancestor of Vigenère.

Übchi

German WWI double columnar transposition variant. Famously broken by French cryptanalysts in 1914 within weeks of its introduction.

Vigenère

The classic 1553 polyalphabetic cipher: each plaintext letter is Caesar-shifted by the corresponding letter of a repeating keyword. Considered unbreakable for three centuries.

Vic

Soviet KGB hand cipher used by spy Reino Häyhänen in the 1950s — combines a straddling checkerboard, two transpositions, and a daily key. The strongest hand cipher ever fielded.

Code Tools 33

Top ↑
Abaddon

Geocaching code that maps each letter to a unique three-symbol group. Supports the canonical alphabet, custom carriers, or auto-detected three-character patterns.

Backslash

Three-character code built from forward slash, pipe, and backslash symbols. Each letter is encoded as a group of three; supports custom carriers and auto-detection.

Baudot Murray

The 5-bit telegraph codes that preceded ASCII — ITA1 (Baudot) on early teleprinters and ITA2 (Baudot–Murray) on Western Union and TWX networks.

Brainf*ck & Ook!

Convert between text, Brainf*ck, Ook!, and Short Ook! code, with a small interpreter.

Chinese Code

Geocaching code that represents each letter as a small grid of dashes and pipes — visually similar to Chinese hanzi strokes, hence the name.

Clock Code

Encodes letters as clock-face hours with AM/PM markers and "00" as a word separator. Often appears in geocaching puzzles using clock imagery.

Colored Squares

Create Colored Squares Code blocks with configurable colors and optional number labels.

Cow

Convert text to COW code and execute COW programs back into text.

Decabit

Ten-bit punched-card-style code where each character is a binary string. Output can be ASCII text or the equivalent decimal numbers.

DTMF

DTMF (Dual-Tone Multi-Frequency) maps each phone-keypad press to a pair of audio frequencies. Only the 16 keypad characters are valid input: digits 0-9, letters A-D, *, and #. Any other character in the plaintext (letters E-Z, spaces, punctuation) is silently dropped.

Dvorak ↔ Qwerty

Convert text typed on one keyboard layout as if it had been typed on the other (QWERTY ↔ Dvorak). Useful when puzzle text was prepared on the wrong layout.

Enclosed Areas

Count enclosed areas in uppercase letters, lowercase letters, and numbers with open or closed 4 handling.

Five Needle Telegraph

Cooke and Wheatstone's 1837 telegraph used five magnetic needles pointing left or right to spell out one of 20 letters across two wires.

GoldBug

The substitution cipher from Edgar Allan Poe's 1843 short story "The Gold-Bug," where the buried-treasure cryptogram is solved by frequency analysis on the page.

Hodor

Translates each letter to a unique syllable in the Hodor language from HBO's Game of Thrones, where the character can only say his own name.

Kenny

Three-character syllabic code based on the muffled speech of Kenny McCormick from South Park, mapping each letter to a sequence of m/f/p sounds.

Letters ↔ Numbers

Convert letters to numbers and numbers back to letters using A=1 through Z=26.

Morse

International Morse code with optional puzzle variants: reverse the sequence, swap dots and dashes, or both — common transformations in mystery caches.

UnMorse

Decode run-on Morse code without separators by branching possible letter groupings and exploring viable translations.

Nak Nak

Encode text to Nak Nak code and decode Nak syllables back to text.

NATO Alphabet

The NATO phonetic alphabet (Alpha, Bravo, Charlie…) used in radio communication to spell out letters unambiguously over noisy channels.

Number Pad Lines

Convert letters or keypad line number paths into Number Pad Lines images.

PLANET Barcode

PLANET (Postal Alpha Numeric Encoding Technique) maps each digit 0-9 to a 5-bar short/tall (i/I) pattern, framed by tall bars. Auto-detects two non-standard symbols (e.g. ./|, a/b, x/o) and tries both orientations.

POSTNET Barcode

POSTNET (Postal Numeric Encoding Technique) maps each digit 0-9 to a 5-bar short/tall (i/I) pattern, framed by tall bars. Auto-detects two non-standard symbols (e.g. ./|, a/b, x/o) and tries both orientations.

Quadoo

A nine-segment digital display alphabet — think calculator-style segments extended to cover the full alphabet. Includes matching symbol images for each character.

Qwerty Coordinates

Convert Qwerty keyboard characters to row and column coordinate pairs.

Qwerty Shifter

Shift letters, numbers, and optional special characters across Qwerty keyboard rows.

Seven-Segment Display

Encode and decode strings written in segment-display notation. Each character is described by the set of segment labels (A, B, C, …) that are lit. Supports 7-, 9-, 14-, and 16-segment displays.

Slash and Pipe

Code in which each letter is encoded as a group of slashes and pipes ( / and | ). A common building block in geocaching cipher puzzles.

Tap / Knock

Convert Tap Code between letters, numeric row-column pairs, and dot groups.

Tomtom

Drum-language code that uses forward slashes and backslashes to represent letters as drumbeat patterns — adapted from African talking-drum traditions.

T9 Decoder

Find dictionary words from T9 predictive text digit sequences.

Vanity

Old-style mobile phone keypad text input: 2=A, 22=B, 222=C, 3=D, etc. Decodes from repeated key presses, key/position pairs, or directional sequences.

Number Tools 32

Top ↑
ASCII / Dec / Bin / Hex / Oct

Convert text and single characters between ASCII, decimal, binary, hexadecimal, and octal — type into any field and the others update live.

Barcode Numbers

Barcode number pattern converter for digits 0 through 9.

Base Conversion

Convert integers between bases 2 through 62.

Base32

Encode and decode text using the standard RFC 4648 Base32 alphabet (A–Z, 2–7). Often seen in TOTP secrets, QR codes, and DNS-safe identifiers.

Base58

Encode and decode text using Base58. Choose between the Bitcoin alphabet (123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz) and the Flickr alphabet (lowercase before uppercase). Base58 omits visually ambiguous characters like 0, O, I, and l.

Base64

Base64 encoder and decoder for text.

Clock Angle

Calculate the angle between the hour and minute hands for any time, or find every time that matches a given angle.

Digital Root

Digital root calculator using several letter value systems.

Euler-Mascheroni (γ)

Euler-Mascheroni constant digit lookup and search helper.

Euler Number (e)

Euler number digit lookup and search helper.

Fibonacci

Fibonacci number generator and lookup tool.

Fraction Approximator

Decimal to fraction approximation helper.

GC Number ↔ GC ID

Convert between geocache GC codes (e.g. GC2J3WZ) and the underlying numeric cache IDs that geocaching.com uses internally.

Golden Ratio (φ)

Golden ratio digit lookup and search helper.

Lucas Numbers

Lucas number generator and lookup tool.

Numbers in Alphabetical Order

Four conversions in one tool: alphabetical index → number word, number word → alphabetical index, number → English spelling, and spelled-out English → integer. The alphabetical order uses the standard 0–100 ranking where eight = 1, eighteen = 2, eighty = 3, and zero = 101.

Numbers To Words

Convert numbers to written English words, or parse spelled-out numbers back to digits.

Numerology

Reduce each letter of a word or phrase to a digit using the Pythagorean (1–9 cycle), Pythagorean (1–0 cycle), or Chaldean systems, then sum and reduce to a single-digit numerology value or digital root.

Pi (π)

Pi digit lookup and search helper.

Prime Numbers

Prime number list and factorization helper.

Pythagoras's Constant (√2)

Square root of 2 digit lookup and search helper.

Roman Numerals

Roman numeral converter for values 1 through 3999.

Scrabble Scorer

Scrabble word score calculator.

Shadoks Numbers

Shadoks number converter using GA BU ZO MEU.

Temperature Converter

Temperature conversion calculator.

Theodorus' Constant (√3)

Square root of 3 digit lookup and search helper.

Time Decimal

Convert clock times to total seconds since midnight and the percentage of the day elapsed. Useful for puzzles that encode coordinates as times.

Triangle Calculator

Triangle side angle area and perimeter calculator from three known attributes.

UTF-8 Tool

UTF-8 text to hex encoder and decoder.

Unit Converter

Common unit conversion calculator.

Vanity Values

Phone keypad vanity value calculator.

Word Values

Word value calculator using multiple letter value systems.

Misc Tools 24

Top ↑
Text Manipulator

Manipulate text for puzzle solving with case changes, filtering, reversing, grouping, ROT transforms, replacement, file loading, saving, and content analysis.

Frequency Analysis

Analyze character frequencies, word counts, letter counts, number counts, and symbol counts in a body of text.

Decision Tree

An interactive flowchart that walks through clues in puzzle text — letter patterns, character sets, common encodings — and points you toward the most likely solver.

HTML Encoder

Encode HTML or text into JavaScript document.write output.

Unicode Characters

Unicode character lookup tool that maps each character in a message to its Unicode code point and name.

Cache Page Creation

Copyable HTML examples for creating geocache pages, including paragraphs, line breaks, centering, text styling, links, images, sizing, inline styling, and divs.

Bookmarklets

Bookmarklets that shortcut coordinate conversion, GC/TB lookup, CacheSleuth search, text manipulation, geocaching user search, keyword search, and GeoCheck captcha entry.

Exif Reader

Upload an image file to read EXIF data. Supports JPEG, PNG, WebP, TIFF, HEIC/HEIF, AVIF and limited GIF support.

ISBN Tool

Convert ISBN-10 to ISBN-13 or ISBN-13 to ISBN-10, and look up ISBN details through Open Library with Amazon and Google fallback searches.

Hash Functions

Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256 hashes for text.

Resistor Color Code

Decode resistor color bands into resistance and tolerance values using the standard color code table.

Periodic Table

Convert element atomic numbers to symbols and names, or convert symbols and names back to atomic numbers.

Spelling With Elements

Spell words with chemical element symbols and view matching periodic table tiles.

DNA Translator

Translate text to and from CacheSleuth DNA code triplets using A, C, G, and T.

Draw A Stickman

Decode and create Draw A Stickman Episode 1 custom message URLs.

Pig Latin

Convert a plain English message into Pig Latin.

Sudoku Solver

HTML Sudoku solver with hints, allowed values, singles, undo, reset, and serial puzzle loading.

Flip A Coin

Flip a coin, guess heads or tails, and track wins, losses, and choices.

Roll The Dice

Roll one or more six-sided dice with running totals. For chance-driven puzzles or just for fun.

QR Code Scanner

Upload a QR code image file and scan the encoded text.

QR Code Generator

Create a custom QR code with configurable text, size, quality level, foreground, and background.

Barcode Generator

Create barcodes in Code 128, Code 39, and EAN-13 formats with configurable size and colors.

Gallifreyan Generator

Translate text into Circular Gallifreyan and save the generated artwork as an image.

Tupper's Formula

Encode and decode Tupper's self-referential formula. Convert text, drawings, or images into the integer k for geocaching puzzle caches, and decode k back into a bitmap.

Reference 3

Top ↑