ReUnicode

The most advanced Unicode inspector on the web. Reveal invisible characters, decode hidden tag text, detect homoglyphs, and clean malicious Unicode from any text.

Tag Characters Zero-Width Bidi Overrides Homoglyphs
Visible
Tag char
Zero-width
Control
Bidi override
Combining
Variation sel.
Private use
Whitespace
Homoglyph

Character Details

Convert normal ASCII text into invisible Unicode tag characters (U+E0000 range). Optionally wrap them inside visible text.

Use underscore _ in the wrap template to mark where the hidden text goes. Leave empty for tag-only output.

Click any card to copy an invisible or special character to your clipboard.

How to Use ReUnicode

1
Paste or type your text into the textarea in the Reveal tab.
2
Every character is instantly analyzed and displayed in a color-coded box. Green = normal visible characters. Any other color = something hidden or suspicious.
3
Red boxes reveal tag characters — invisible Unicode that secretly encodes letters. ReUnicode shows you the actual hidden letter inside each red box.
4
Click any character box to see full details: code point, UTF-8 bytes, character name, and what it decodes to.
5
Use the Clean tab to strip hidden characters. Use Generate to create your own tag-encoded text.

What Are Invisible Characters?

Invisible characters are Unicode symbols that don't render visually but still exist in your text. They occupy bytes, pass through copy-paste, and survive in databases, blockchains, URLs, and filenames. Most text editors and applications have no way to show them.

These aren't just blank spaces. Unicode defines hundreds of characters specifically designed to be invisible, and they serve a range of purposes — from legitimate text formatting to deliberate obfuscation.

Types of Hidden Characters

Tag Characters (U+E0001–U+E007F) — The most deceptive. Each tag character maps to an ASCII letter but is completely invisible. The word "HELLO" can be silently embedded in any text with 5 tag characters, and no standard viewer will show it. Originally intended for language tagging metadata, now deprecated but still processed by systems everywhere.

Zero-Width Characters — Zero-width space (U+200B), zero-width joiner (U+200D), zero-width non-joiner (U+200C), and others. These take up zero horizontal space. Used legitimately for line-break hints and ligature control, but exploited for watermarking text, bypassing duplicate checks, and creating invisible messages.

Bidi Overrides — Right-to-left override (U+202E), left-to-right override (U+202D), and isolates. These characters change the visual ordering of text without changing the underlying data. Attackers use them to disguise filenames (making .exe look like .doc) and deceive readers about the true content of text.

Homoglyphs — Characters from different Unicode scripts that look identical to Latin letters. Cyrillic 'a' (U+0430) is visually indistinguishable from Latin 'a' (U+0061) but they are different code points. Used in phishing URLs, impersonation, and filter evasion.

Combining Characters — Diacritical marks and modifiers that stack on top of the previous character. A single visible letter can have dozens of combining marks attached, creating "Zalgo text" or hiding data in seemingly normal text.

Invisible Character Reference

The following characters are detected and categorized by ReUnicode. Click any row to copy that character.

Zero-Width Characters

VisualNameCodepointHTMLBytes

Bidi & Directional Overrides

VisualNameCodepointHTMLBytes

Special Whitespace

VisualNameCodepointHTMLBytes

Tag Characters (A–Z)

Each maps to an invisible copy of its ASCII equivalent. All are 4 bytes in UTF-8.

DecodedNameCodepointHTML

Common Uses of Invisible Characters

Invisible characters are used both legitimately and maliciously across many platforms and contexts.

Blank Usernames U+200B

Create empty-looking names on social, gaming, and chat platforms like Discord, Telegram, and Steam.

Invisible Messages U+00A0

Send "blank" messages in apps like WhatsApp and iMessage that block normal empty sends.

Text Watermarking U+200B–D

Embed hidden binary signatures in text using combinations of zero-width characters to trace leaks.

Filter Bypassing U+E0041+

Insert invisible characters into banned words to evade content filters while keeping the text readable.

Phishing URLs Cyrillic

Register domains with homoglyph characters that look identical to legitimate sites.

File Disguise U+202E

Use right-to-left override to make filenames display as a different extension (e.g., .exe appears as .doc).

Blockchain Data U+E0041+

Hide messages in on-chain token names and metadata that appear blank to explorers but contain hidden text.

SEO Manipulation U+200B

Insert zero-width characters to stuff keywords invisible to readers but indexed by crawlers.

Platform-Specific Uses

Discord

Zero-width spaces for blank nicknames, invisible role names, and spoiler-free padding.

Twitter / X

Hidden text in display names, invisible characters to bypass mute filters.

Among Us

U+3164 (Hangul Filler) for invisible player names in lobbies.

Fortnite / PUBG

Zero-width spaces (U+200B) for blank or invisible in-game usernames.

WhatsApp

U+200E (LTR mark) to send invisible messages that bypass empty-message blocking.

Solana / Pump.fun

Tag characters in token names create tokens with invisible or partially hidden names on-chain.

Frequently Asked Questions

What are Unicode tag characters?
Tag characters (U+E0001 to U+E007F) are Unicode code points in the Supplementary Special-purpose Plane. Each one corresponds to an ASCII character but is defined as invisible. For example, U+E0050 is "Tag Latin Capital Letter P" — it encodes the letter P but renders as nothing in most software. They were originally designed for language identification tags but were deprecated by Unicode. Despite this, they remain valid and are accepted by many systems.
How many bytes do invisible characters use?
It depends on the character. Zero-width spaces (U+200B) use 3 bytes in UTF-8. Tag characters (U+E0041+) use 4 bytes each. This matters in systems with byte-length limits. For example, a field limited to 10 bytes can fit at most 2 tag characters (8 bytes) or 3 ASCII characters plus 1 tag character.
Can invisible characters be detected?
Yes, if you use the right tools. Most text editors, browsers, and terminals won't show them. Standard "character count" functions count them as characters but display nothing. ReUnicode detects all categories of hidden Unicode: tag characters, zero-width characters, bidi overrides, combining marks, homoglyphs, variation selectors, and private use area characters.
Are homoglyphs the same as invisible characters?
No. Homoglyphs are visible characters that look identical to other characters from a different script. For example, Cyrillic 'o' (U+043E) looks exactly like Latin 'o' (U+006F). They're not invisible — they're deceptive. ReUnicode detects common homoglyphs and highlights them so you can see which characters aren't what they appear to be.
What is a bidi override attack?
Bidirectional override characters (like U+202E, Right-to-Left Override) force text to display in reverse order. An attacker can name a file "document‮cod.exe" which visually appears as "documentexe.doc" — making a dangerous .exe file look like a harmless .doc file. ReUnicode flags all bidi control characters in pink.
Is this tool free?
Yes. ReUnicode is free, runs entirely in your browser, and never sends your text to any server. All analysis happens locally in JavaScript.
Copied!