Constructing the Word's First JPEG XL MD5 Hash Quine
https://stackchk.fail/blog/jxl_hashquine_writeup
#HackerNews #JPEGXL #MD5 #Hash #Quine #Hashing #Programming #HackerNews
Constructing the Word's First JPEG XL MD5 Hash Quine
https://stackchk.fail/blog/jxl_hashquine_writeup
#HackerNews #JPEGXL #MD5 #Hash #Quine #Hashing #Programming #HackerNews
Ever thought hashes could paint colors or shape avatars?
In this new Quarkus tutorial, I explore creative uses of Apache Commons Codec — from deterministic color generation to distributed fingerprints.
🔗 https://www.the-main-thread.com/p/creative-digest-applications-quarkus-apache-commons-codec
Can there be a #password #hashing algorithm that considers the distance between each character key on a keyboard (of some specific layout, say QWERTY)? The difficulty of hitting the correct character on a small 26-key on-screen keyboard on my phone is making me think whether we should have a relaxed algorithm that gives some fault tolerance... (Surely it'll not be as secure, but it could allow longer passwords on phones.)
When Your Hash Becomes a String: Hunting Ruby's Million-to-One Memory Bug
https://mensfeld.pl/2025/11/ruby-ffi-gc-bug-hash-becomes-string/
#HackerNews #Ruby #Memory #Bug #Hashing #FFI #Programming #Debugging
“Modern Perfect Hashing”, Steinar H. Gunderson (https://blog.sesse.net/blog/tech/2025-10-23-21-23_modern_perfect_hashing.html).
Via HN: https://news.ycombinator.com/item?id=45689905
On Lobsters: https://lobste.rs/s/i33fks/modern_perfect_hashing
#Hashing #PerfectHashing #Programming #LexicalAnalysis #Tokenization #Compilers #Algorithms
Love 😍 such articles that cover a topic in depth:
“Modern Perfect Hashing For Strings” [2023], Wojciech Muła (http://0x80.pl/notesen/2023-04-30-lookup-in-strings.html).
On HN: https://news.ycombinator.com/item?id=35764176
#Hashing #PerfectHashing #Lexing #LexicalAnalysis #Programming #Algorithms #Trie #gperf #Tokenization
[New Blog Post] A Slotted Hash Cons for Alpha Invariance https://www.philipzucker.com/slotted_hash_cons/ #hashing #egraph #lambda
New crate published: https://crates.io/crates/souphash
SoupHash: an order-independent hash function. Designed to be used for hashing unordered collections, or hashing over multiple threads.
This has not been extensively reviewed, so any kind of feedback is more than welcome!
How Weak Passwords Beat Strong Passwords
https://vigilante.tv/videos/watch/9d5eebba-4667-481d-9f19-3fa483eff187
Hashing is an Integrity control that helps ensure data has not been tampered with. It provides a unique digital fingerprint for verification. #Hashing
THE FEATURE #LARAVEL DIDN'T WANT YOU TO HAVE!
Just a little helper to make fingerprints:
https://github.com/Laragear/Fingerprint
#PHP #Programming #Software #SoftwareDevelopment #WebDevelopment #WebDev #AppDevelopment #AppDev #Coding #Code #GitHub #Git #Cryptography #Security #Hash #Hashing #Fingerprint #digitalfingerprint
Ah yes, because the world was desperately incomplete without a way to hash a 25-byte string in merely 68 clock cycles. 😴🔧 Meanwhile, the rest of us are still waiting for the riveting sequel where we parallelize the #parallelization of parallelizing. 🚀💼
https://www.controlpaths.com/2025/06/29/parallelizing_sha256-calculation-fpga/ #hashing #innovation #tech #humor #developer #life #HackerNews #ngated
Collection of universal hashing functions in Rust:
🎲 Oh, the joys of #hashing your way to oblivion! It's somehow "groundbreaking" that the #math behind hash collisions is akin to picking a random box 🤯. Who knew computer science could be distilled into a carnival game? 🎪📚
https://kevingal.com/blog/collisions.html #hashcollisions #computerscience #carnivalgame #groundbreaking #HackerNews #ngated
Hashes for the Masses: Finding What Matters in a Sea of Samples
A short while back, I released a pair of tools for building MD5 hash sets — one targeting known-good gold builds, the other designed for scanning malware corpora. The goal was simple: generate hash sets that could be used in forensics tools like Axiom Cyber to flag IOC matches during case processing.
Recently, I hit a familiar problem: I had a hash and wanted to know if that file existed in my malware library. Step one was updating my tooling to support SHA256 — the modern standard for hash sharing — and regenerating the hash sets. That part worked. I could search for a hash and confirm whether it appeared in my set.
But what if I got a match?
At that point, I realized: I had no way to correlate the match back to the original file. With ~30,000 samples in the library, “just eyeballing it” wasn’t an option.
As I’ve been coding up new tools — or revisiting earlier ones — I’ve discovered that rabbit holes have rabbit holes.
So I updated the SHA256 tool to not only generate a hash set, but also produce a .tsv lookup table mapping each hash to its full file path. This made the sets usable both in forensics platforms and for custom lookups in more ad hoc workflows. As they say: necessity is the mother of intention.
Of course, that led to another realization. I now had four hashing tools — two for MD5 (MZ and non-MZ), and two for SHA256. The “Hashing Tools” section in MalChela was getting a bit crowded.
Back to the drawing board.
The Result: Three Unified Tools
I consolidated and upgraded everything into three tools — all of which support both CLI and GUI usage.
#️⃣ MZHash (replaces mzmd5)
• Uses YARA to recursively scan for files with an MZ header (i.e., Windows executables and DLLs)
• Generates one hash file per selected algorithm: MD5, SHA1, SHA256
• Also creates a .tsv lookup file for each, mapping hashes to paths
cargo run -p mzhash /directory/to/scan -- -a MD5 -a SHA1 -a SHA256Via GUI, you can browse to the folder and check boxes for each algorithm.
🌐 XMZHash (replaces xmzmd5)
• Uses YARA to skip over files with MZ, ZIP, or PDF headers
• Hashes everything else — ideal for surfacing Linux, Mac, or unusual samples from a mixed malware corpus
• Also supports .tsv lookup file generation
cargo run -p xmzhash /directory/to/scan -- -a MD5 -a SHA1 -a SHA256The idea: hash what’s not obviously Windows, document-related, or un-extracted samples.
XMZHash🔍 HashCheck
Okay, so naming might not be my strong suit. But this tool’s direct.
• Provide a hash value and a .txt or .tsv hash set
• It checks for matches, and if you’re using a .tsv, it shows the file path of the match
• Great for live triage, corpus hunting, or checking known-bads
cargo run -p hashcheck ./hashes.tsv 44d88612fea8a8f36de82e1278abb02f Hash Check In Summary
MalChela 2.2.1 expands its hashing toolkit with the introduction of HashCheck, MZHash, and XMZHash — giving analysts faster ways to flag known-good, isolate unknowns, and build actionable sets. In this release, we’ve also said goodbye to legacy tools, standardized output saving, and doubled down on clarity across both CLI and GUI workflows.
Download: https://github.com/dwmetz/MalChela/releases
User Guide: https://dwmetz.github.io/MalChela/
The Guide to #Hashing I Wish I Had When I Started
🚀 Introducing the #hashing #algorithm that measures stuff real fast, because apparently 71GB/s is a thing now. 🤔 GitHub's latest novelty, where menus and buzzwords run as fast as the hash! 🏃♂️💨 Forget solving real problems, let's just talk speed!
https://github.com/Nicoshev/rapidhash #speed #GitHub #tech #innovation #performance #HackerNews #ngated
MS: This is no big deal
Hackers, 8 days later: Well, how about now?
#cybersecurity #ntlm #hashing #microsoft #cve #microsoft
https://www.theregister.com/2025/04/21/microsoft_apple_patch/