Decrypt a short word
Input
key 030015070A
Output
hello
The same key used for encryption is required to recover the plaintext.
Developer Tools
Review practical XOR Decrypt examples so you can understand expected input, output, and common patterns faster.
Use this XOR Decrypt tool to reverse XOR-encrypted hexadecimal text using the same key that was used for encryption. It is useful for CTF practice, cryptography basics, byte-level debugging, reversible obfuscation demos, and understanding how XOR transforms can be undone when the key is known.
Example pages are especially useful for developer tools because they show what good input looks like, what kind of output to expect, and how the tool behaves in common scenarios.
Input
key 030015070A
Output
hello
The same key used for encryption is required to recover the plaintext.
Input
abc 20161700010A
Output
Attack
Useful for reversing a repeating-key XOR sample.
Fix: Use exactly the same key that was used to encrypt the text.
Fix: Enter only hexadecimal characters with an even total length.
Fix: This tool expects hexadecimal ciphertext, not ordinary text.
Fix: Put the key first and the hex ciphertext below it.
Fix: This tool only reverses simple XOR when the key is already known.
After reviewing these examples, run the live tool with your own input. If your task involves a follow-up step, the related page can help you move to the next tool in the workflow.
Open the main XOR Decrypt page and test your own real input.