All Tools
Browse every tool on CacheSleuth, organized by category.
Featured
Map Tools 18
Top ↑Convert geocoordinates between Decimal Degrees, DDM, DMS, UTM, MGRS, Plus Codes, Geohash, Maidenhead, Reverse Wherigo, and many more, with map links and elevation lookup.
Calculate coordinates from Waldmeister Reverse Wherigo codes, or create codes from cache coordinates.
Calculate coordinates from day1976 Reverse Wherigo codes, or create codes from cache coordinates.
Calculate the distance, bearing, and midpoint between two GPS coordinates in common geocaching coordinate formats.
Project a waypoint from a GPS coordinate using a bearing and distance, then view the projected point and midpoint.
Find possible geocache coordinates when one to three digits are missing from a DDM coordinate.
Batch convert GPS coordinates between DDM, DD, DMS, UTM, MGRS, Plus Code, Reverse Wherigo, OSGB, GeoHex, Geo3x3, Maidenhead, NAC, Geohash, Mercator, and antipode.
Map a list of GPS coordinates and calculate segment and total distances between points.
Calculate the intersection points of two circles from center coordinates and radii.
Calculate the intersection point of three circles from center coordinates and radii.
Calculate the center point and radius of a circle passing through three GPS coordinates.
Calculate the center, area, and perimeter of a triangle defined by three GPS coordinates.
Find an unknown point using two known coordinate points and a bearing from each.
Calculate where a line defined by two GPS points intersects a circle defined by a center point and radius.
Find where two bearing lines intersect using two known coordinate points and a bearing from each.
Calculate the intersection of a bearing projected from one coordinate point with a line segment defined by two other coordinate points.
Find where two geodesic lines intersect. Lines are drawn from A to B and C to D.
Enter coordinates or use your current location to drop a draggable pin on the map. Click the map to reposition the pin.
Code Tables 3
Top ↑Browse 250+ geocaching code tables in one place, including Pigpen, Braille, flags, fictional alphabets, symbols, and more.
Code image tool to display over 250 code tables, especially useful for geocache puzzle solving.
View every supported geocaching code table example in one place using custom text.
Cipher Tools 48
Top ↑Add a numeric key to each letter's position to shift it — a classical generalization of Caesar where the shift can vary per character. Custom alphabets supported.
German WWI field cipher (1918) combining a 5×5 Polybius square (using only ADFGX as coordinates, easy to send by Morse) with a keyword-based columnar transposition.
Successor to ADFGX with a 6×6 square that includes digits 0–9. Used by the German army in 1918 until cracked by French cryptanalyst Georges Painvin.
Each letter's position is multiplied by one key, then offset by another, modulo 26 — the affine map of monoalphabetic ciphers. Caesar is the special case where the multiplier is 1.
Hebrew kabbalistic substitution cipher that splits the alphabet in half and swaps the corresponding letters of the two halves. A close cousin of Atbash.
ASCII-85 and Base85 encoder and decoder for converting text to and from Adobe-style ASCII85.
Hebrew substitution cipher that reverses the alphabet — A↔Z, B↔Y, C↔X — appearing in the Book of Jeremiah. The simplest reciprocal cipher.
Polyalphabetic Vigenère variant that extends the keyword with the plaintext (or ciphertext) itself, so the running key never repeats. Configurable alphabets and keyword.
Francis Bacon's 1605 binary cipher hides a message inside an apparently innocent text using two letterforms (or two typefaces) per letter. Includes Bacon's distinct and merged variants plus puzzle-style key options.
Reciprocal Vigenère variant where the same operation encrypts and decrypts. Named after Admiral Sir Francis Beaufort, who based it on Giovanni Sestri's earlier work.
Close cousin of Beaufort that reverses the subtraction direction (key minus plaintext). Used on Confederate-era cipher disks during the American Civil War.
Felix Delastelle's fractionating cipher: each letter splits into two coordinates on a 5×5 Polybius square, coordinates are interleaved across a period, and read back as new letters.
Reversible block-sorting transform that rearranges text into runs of similar letters. Used inside the bzip2 compressor and as a puzzle scrambler that decodes cleanly back.
Simple transposition that writes the plaintext into a rectangular grid row by row, then reads it back column by column. Quick to spot when text length is a perfect square.
Italian 19th-century swap cipher used by the Carbonari secret society in the lead-up to Italian unification, pairing letters around a central pivot.
John F. Byrne's 1918 two-disk cipher in which both alphabets permute themselves after every letter. Byrne offered cash prizes for breaking it; the algorithm wasn't published until 2010.
Plaintext is written into a grid below a keyword, then read out column by column in the order given by the keyword's letter ranks. Configurable padding and alphabet.
Columnar transposition applied twice with two different keywords. Used by Allied and Axis intelligence services through World War II for medium-grade traffic.
German WWII rotor machine simulator: pick rotors I–VIII, set ring positions, choose a reflector, and define plugboard pairs. The same settings encrypt and decrypt.
Felix Delastelle's digraph cipher that operates on letter pairs using four 5×5 squares — two filled with a keyed alphabet, two with the standard alphabet.
Plaintext is converted to Morse, regrouped in threes (with separators), then each three-symbol group is looked up in a keyed alphabet. Used by US forces in World War I.
Vigenère with a numeric key (digits 0–9) instead of a letter keyword — each plaintext letter shifts by the matching digit. Supports autokey mode and custom alphabets.
Lester Hill's 1929 polygraphic cipher: plaintext blocks are multiplied by a 2×2 matrix key modulo 26, the first cipher to operate on more than three letters at a time.
One of the earliest substitution ciphers, described in the 4th-century Sanskrit Kama Sutra. The 26 letters are paired so each letter encrypts to its partner and vice versa.
Shift each letter to a neighbor on a physical keyboard layout — left, right, up, or down. Supports QWERTY, AZERTY, and QWERTZ layouts.
Caesar shift built on a keyed alphabet: the keyword's unique letters appear first, then the rest of the alphabet, and the whole thing is rotated.
Each plaintext letter's position is multiplied by a key (coprime with 26) modulo 26 — a close cousin of Caesar that scrambles instead of just shifting.
Russian Nihilist cipher combining a Polybius square with a numeric keyword. Each plaintext letter and each keyword letter are converted to two-digit Polybius coordinates and added together to produce the ciphertext.
The only mathematically unbreakable cipher when the key is truly random, as long as the message, and used exactly once. Generate a fresh pad or supply your own.
Italian Renaissance cipher developed by Pope Innocent X's secretary Matteo Argenti and named after the Pizzini family — letters map to numbered positions in a keyed grid.
Charles Wheatstone's 1854 digraph cipher worked on letter pairs using a keyed 5×5 grid. Adopted by the British in the Boer War and World War I.
Morse-based cipher in which dots, dashes, and separators are each replaced by one of several substitute characters, masking the underlying Morse pattern.
Each letter is encoded as the row/column coordinates of its position in a 5×5 (letters) or 6×6 (letters + digits) grid. Supports keyed alphabets and custom coordinate labels.
Giovanni Battista della Porta's 1563 reciprocal polyalphabetic cipher. The keyword chooses one of 13 alphabet pairings, and the same operation encrypts and decrypts.
Write the plaintext zig-zagging down and up across a chosen number of rails, then read it off row by row. Configurable rail count and starting offset.
Shift each letter by a chosen amount, with one-click presets for ROT13, ROT5, ROT18, and ROT47 covering letters, digits, and the full printable ASCII range.
Rotate text written into a grid 90° left or right — handy for puzzle text laid out in non-standard reading orders. Configurable column count and padding.
Caesar-style rotation that lets you choose exactly which characters get shifted and which pass through untouched. Useful for puzzles that mix cipher and plain text.
Writes the plaintext into a grid and reads it back along a chosen path — spiral, diagonal, or zig-zag — instead of plain columns.
Vigenère-style cipher where the key is a long passage of natural text (a book, a poem) rather than a short repeated keyword, defeating standard Kasiski analysis.
Ancient Spartan transposition cipher: text wrapped around a cylinder of a specific diameter, then unwrapped, scrambles into a regular column rotation.
Soviet-era fractionating cipher mapping common letters to single digits and rare ones to two-digit codes. Often used as an additive over a one-time pad in VIC-style ciphers.
Map each plaintext letter to a custom target letter using a keyed alphabet — the foundation under almost every monoalphabetic cipher in this list.
Felix Delastelle's three-dimensional extension of Bifid. Each letter gets three coordinates from a 27-character cube, interleaved across a period before being read back.
Johannes Trithemius's 1508 progressive Caesar — each letter shifts by one more than the previous. The first published polyalphabetic cipher and the direct ancestor of Vigenère.
German WWI double columnar transposition variant. Famously broken by French cryptanalysts in 1914 within weeks of its introduction.
The classic 1553 polyalphabetic cipher: each plaintext letter is Caesar-shifted by the corresponding letter of a repeating keyword. Considered unbreakable for three centuries.
Soviet KGB hand cipher used by spy Reino Häyhänen in the 1950s — combines a straddling checkerboard, two transpositions, and a daily key. The strongest hand cipher ever fielded.
Code Tools 33
Top ↑Geocaching code that maps each letter to a unique three-symbol group. Supports the canonical alphabet, custom carriers, or auto-detected three-character patterns.
Three-character code built from forward slash, pipe, and backslash symbols. Each letter is encoded as a group of three; supports custom carriers and auto-detection.
The 5-bit telegraph codes that preceded ASCII — ITA1 (Baudot) on early teleprinters and ITA2 (Baudot–Murray) on Western Union and TWX networks.
Convert between text, Brainf*ck, Ook!, and Short Ook! code, with a small interpreter.
Geocaching code that represents each letter as a small grid of dashes and pipes — visually similar to Chinese hanzi strokes, hence the name.
Encodes letters as clock-face hours with AM/PM markers and "00" as a word separator. Often appears in geocaching puzzles using clock imagery.
Create Colored Squares Code blocks with configurable colors and optional number labels.
Convert text to COW code and execute COW programs back into text.
Ten-bit punched-card-style code where each character is a binary string. Output can be ASCII text or the equivalent decimal numbers.
DTMF (Dual-Tone Multi-Frequency) maps each phone-keypad press to a pair of audio frequencies. Only the 16 keypad characters are valid input: digits 0-9, letters A-D, *, and #. Any other character in the plaintext (letters E-Z, spaces, punctuation) is silently dropped.
Convert text typed on one keyboard layout as if it had been typed on the other (QWERTY ↔ Dvorak). Useful when puzzle text was prepared on the wrong layout.
Count enclosed areas in uppercase letters, lowercase letters, and numbers with open or closed 4 handling.
Cooke and Wheatstone's 1837 telegraph used five magnetic needles pointing left or right to spell out one of 20 letters across two wires.
The substitution cipher from Edgar Allan Poe's 1843 short story "The Gold-Bug," where the buried-treasure cryptogram is solved by frequency analysis on the page.
Translates each letter to a unique syllable in the Hodor language from HBO's Game of Thrones, where the character can only say his own name.
Three-character syllabic code based on the muffled speech of Kenny McCormick from South Park, mapping each letter to a sequence of m/f/p sounds.
Convert letters to numbers and numbers back to letters using A=1 through Z=26.
International Morse code with optional puzzle variants: reverse the sequence, swap dots and dashes, or both — common transformations in mystery caches.
Decode run-on Morse code without separators by branching possible letter groupings and exploring viable translations.
Encode text to Nak Nak code and decode Nak syllables back to text.
The NATO phonetic alphabet (Alpha, Bravo, Charlie…) used in radio communication to spell out letters unambiguously over noisy channels.
Convert letters or keypad line number paths into Number Pad Lines images.
PLANET (Postal Alpha Numeric Encoding Technique) maps each digit 0-9 to a 5-bar short/tall (i/I) pattern, framed by tall bars. Auto-detects two non-standard symbols (e.g. ./|, a/b, x/o) and tries both orientations.
POSTNET (Postal Numeric Encoding Technique) maps each digit 0-9 to a 5-bar short/tall (i/I) pattern, framed by tall bars. Auto-detects two non-standard symbols (e.g. ./|, a/b, x/o) and tries both orientations.
A nine-segment digital display alphabet — think calculator-style segments extended to cover the full alphabet. Includes matching symbol images for each character.
Convert Qwerty keyboard characters to row and column coordinate pairs.
Shift letters, numbers, and optional special characters across Qwerty keyboard rows.
Encode and decode strings written in segment-display notation. Each character is described by the set of segment labels (A, B, C, …) that are lit. Supports 7-, 9-, 14-, and 16-segment displays.
Code in which each letter is encoded as a group of slashes and pipes ( / and | ). A common building block in geocaching cipher puzzles.
Convert Tap Code between letters, numeric row-column pairs, and dot groups.
Drum-language code that uses forward slashes and backslashes to represent letters as drumbeat patterns — adapted from African talking-drum traditions.
Find dictionary words from T9 predictive text digit sequences.
Old-style mobile phone keypad text input: 2=A, 22=B, 222=C, 3=D, etc. Decodes from repeated key presses, key/position pairs, or directional sequences.
Number Tools 32
Top ↑Convert text and single characters between ASCII, decimal, binary, hexadecimal, and octal — type into any field and the others update live.
Barcode number pattern converter for digits 0 through 9.
Convert integers between bases 2 through 62.
Encode and decode text using the standard RFC 4648 Base32 alphabet (A–Z, 2–7). Often seen in TOTP secrets, QR codes, and DNS-safe identifiers.
Encode and decode text using Base58. Choose between the Bitcoin alphabet (123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz) and the Flickr alphabet (lowercase before uppercase). Base58 omits visually ambiguous characters like 0, O, I, and l.
Base64 encoder and decoder for text.
Calculate the angle between the hour and minute hands for any time, or find every time that matches a given angle.
Digital root calculator using several letter value systems.
Euler-Mascheroni constant digit lookup and search helper.
Euler number digit lookup and search helper.
Fibonacci number generator and lookup tool.
Decimal to fraction approximation helper.
Convert between geocache GC codes (e.g. GC2J3WZ) and the underlying numeric cache IDs that geocaching.com uses internally.
Golden ratio digit lookup and search helper.
Lucas number generator and lookup tool.
Four conversions in one tool: alphabetical index → number word, number word → alphabetical index, number → English spelling, and spelled-out English → integer. The alphabetical order uses the standard 0–100 ranking where eight = 1, eighteen = 2, eighty = 3, and zero = 101.
Convert numbers to written English words, or parse spelled-out numbers back to digits.
Reduce each letter of a word or phrase to a digit using the Pythagorean (1–9 cycle), Pythagorean (1–0 cycle), or Chaldean systems, then sum and reduce to a single-digit numerology value or digital root.
Pi digit lookup and search helper.
Prime number list and factorization helper.
Square root of 2 digit lookup and search helper.
Roman numeral converter for values 1 through 3999.
Scrabble word score calculator.
Shadoks number converter using GA BU ZO MEU.
Temperature conversion calculator.
Square root of 3 digit lookup and search helper.
Convert clock times to total seconds since midnight and the percentage of the day elapsed. Useful for puzzles that encode coordinates as times.
Triangle side angle area and perimeter calculator from three known attributes.
UTF-8 text to hex encoder and decoder.
Common unit conversion calculator.
Phone keypad vanity value calculator.
Word value calculator using multiple letter value systems.
Misc Tools 24
Top ↑Manipulate text for puzzle solving with case changes, filtering, reversing, grouping, ROT transforms, replacement, file loading, saving, and content analysis.
Analyze character frequencies, word counts, letter counts, number counts, and symbol counts in a body of text.
An interactive flowchart that walks through clues in puzzle text — letter patterns, character sets, common encodings — and points you toward the most likely solver.
Encode HTML or text into JavaScript document.write output.
Unicode character lookup tool that maps each character in a message to its Unicode code point and name.
Copyable HTML examples for creating geocache pages, including paragraphs, line breaks, centering, text styling, links, images, sizing, inline styling, and divs.
Bookmarklets that shortcut coordinate conversion, GC/TB lookup, CacheSleuth search, text manipulation, geocaching user search, keyword search, and GeoCheck captcha entry.
Upload an image file to read EXIF data. Supports JPEG, PNG, WebP, TIFF, HEIC/HEIF, AVIF and limited GIF support.
Convert ISBN-10 to ISBN-13 or ISBN-13 to ISBN-10, and look up ISBN details through Open Library with Amazon and Google fallback searches.
Generate MD5, SHA-1, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256 hashes for text.
Decode resistor color bands into resistance and tolerance values using the standard color code table.
Convert element atomic numbers to symbols and names, or convert symbols and names back to atomic numbers.
Spell words with chemical element symbols and view matching periodic table tiles.
Translate text to and from CacheSleuth DNA code triplets using A, C, G, and T.
Decode and create Draw A Stickman Episode 1 custom message URLs.
Convert a plain English message into Pig Latin.
HTML Sudoku solver with hints, allowed values, singles, undo, reset, and serial puzzle loading.
Flip a coin, guess heads or tails, and track wins, losses, and choices.
Roll one or more six-sided dice with running totals. For chance-driven puzzles or just for fun.
Upload a QR code image file and scan the encoded text.
Create a custom QR code with configurable text, size, quality level, foreground, and background.
Create barcodes in Code 128, Code 39, and EAN-13 formats with configurable size and colors.
Translate text into Circular Gallifreyan and save the generated artwork as an image.
Encode and decode Tupper's self-referential formula. Convert text, drawings, or images into the integer k for geocaching puzzle caches, and decode k back into a bitmap.