Encrypt a short word
Input
key hello
Output
030015070A
The first line is the key, and the lines below are the plaintext.
Developer Tools
Review practical XOR Encrypt examples so you can understand expected input, output, and common patterns faster.
Use this XOR Encrypt tool to combine text with a key using the XOR operation and produce a hexadecimal output. It is useful for learning basic cryptography concepts, CTF practice, reversible obfuscation demos, byte-level debugging, and understanding how key-based XOR transforms plain input. Paste text and a key to generate XOR-encrypted output instantly.
Example pages are especially useful for developer tools because they show what good input looks like, what kind of output to expect, and how the tool behaves in common scenarios.
Input
key hello
Output
030015070A
The first line is the key, and the lines below are the plaintext.
Input
abc Attack
Output
20161700010A
Useful for seeing how a short repeating key affects multiple characters.
Fix: Put the key on the first line and the plaintext below it.
Fix: XOR with a repeating key is educational, not secure for real protection.
Fix: You must use exactly the same key to reverse the result.
Fix: This tool returns hexadecimal so the XOR result stays readable and copy-safe.
Fix: Always place the key first, then the source text on the following lines.
After reviewing these examples, run the live tool with your own input. If your task involves a follow-up step, the related page can help you move to the next tool in the workflow.
Open the main XOR Encrypt page and test your own real input.