Logo on the right is for the Password Cracking utility Hashcat
There are multiple ways to represent text.
One of the most common ways is with the ASCII encoding, which all of the bellow examples are in.
ASCII is just a way to store our normal English language characters into data.
However, you can represent that data itself in different ways.
Binary, Octal, Decimal, Hexadecimal, and Base64
In reality, these are not <b>true</b> passwords.
The data is still there, just represented to us differently.
Some CTFs will include these in password cracking sections.
People (unfortunately) tend to use the same password on multiple websites.
Passwords are meant to be secret, even in the event of a data breach, your passwords should remain secret.
To do this, passwords are hashed by websites.
These are one input to one output math functions that are easy to perform one way, but hard the reverse way.
Passwords are often salted, which is adding a random extra data to the input password.
Below is an example of the same password, with different salts, resulting in different hashes.
Why would people salt passwords? To prevent the usage of hash tables