#hashing

2025-11-19

Ever thought hashes could paint colors or shape avatars?
In this new Quarkus tutorial, I explore creative uses of Apache Commons Codec — from deterministic color generation to distributed fingerprints.

🔗 the-main-thread.com/p/creative

#Java #Quarkus #ApacheCommons #Hashing #Coding

Austin Huang ❤️austin@mstdn.party
2025-11-12

Can there be a #password #hashing algorithm that considers the distance between each character key on a keyboard (of some specific layout, say QWERTY)? The difficulty of hitting the correct character on a small 26-key on-screen keyboard on my phone is making me think whether we should have a relaxed algorithm that gives some fault tolerance... (Surely it'll not be as secure, but it could allow longer passwords on phones.)

Hacker Newsh4ckernews
2025-11-09
रञ्जित (Ranjit Mathew)rmathew
2025-10-25

Love 😍 such articles that cover a topic in depth:

“Modern Perfect Hashing For Strings” [2023], Wojciech Muła (0x80.pl/notesen/2023-04-30-loo).

On HN: news.ycombinator.com/item?id=3

2025-10-09

Pretty surprised to see that the armv6m optimized Ascon-Hash256 (winner of NISTs lightweight crypto competition) is 3x slower than the standard BLAKE2s reference implementation on a Cortex-M0+ 😲

#hashing #ascon

Philip Zuckersandmouth@types.pl
2025-09-15

[New Blog Post] A Slotted Hash Cons for Alpha Invariance philipzucker.com/slotted_hash_ #hashing #egraph #lambda

Andrea Corbelliniandxor@mstdn.social
2025-09-05

New crate published: crates.io/crates/souphash

SoupHash: an order-independent hash function. Designed to be used for hashing unordered collections, or hashing over multiple threads.

This has not been extensively reviewed, so any kind of feedback is more than welcome!

#RustLang #Crate #Hashing

2025-08-14
2025-07-22

Hashing is an Integrity control that helps ensure data has not been tampered with. It provides a unique digital fingerprint for verification. #Hashing

N-gated Hacker Newsngate
2025-07-03

Ah yes, because the world was desperately incomplete without a way to hash a 25-byte string in merely 68 clock cycles. 😴🔧 Meanwhile, the rest of us are still waiting for the riveting sequel where we parallelize the of parallelizing. 🚀💼
controlpaths.com/2025/06/29/pa

Jan :rust: :ferris:janriemer@floss.social
2025-06-28
N-gated Hacker Newsngate
2025-06-25

🎲 Oh, the joys of your way to oblivion! It's somehow "groundbreaking" that the behind hash collisions is akin to picking a random box 🤯. Who knew computer science could be distilled into a carnival game? 🎪📚
kevingal.com/blog/collisions.h

Hashes for the Masses: Finding What Matters in a Sea of Samples

A short while back, I released a pair of tools for building MD5 hash sets — one targeting known-good gold builds, the other designed for scanning malware corpora. The goal was simple: generate hash sets that could be used in forensics tools like Axiom Cyber to flag IOC matches during case processing.

Recently, I hit a familiar problem: I had a hash and wanted to know if that file existed in my malware library. Step one was updating my tooling to support SHA256 — the modern standard for hash sharing — and regenerating the hash sets. That part worked. I could search for a hash and confirm whether it appeared in my set.

But what if I got a match?

At that point, I realized: I had no way to correlate the match back to the original file. With ~30,000 samples in the library, “just eyeballing it” wasn’t an option.

As I’ve been coding up new tools — or revisiting earlier ones — I’ve discovered that rabbit holes have rabbit holes.

So I updated the SHA256 tool to not only generate a hash set, but also produce a .tsv lookup table mapping each hash to its full file path. This made the sets usable both in forensics platforms and for custom lookups in more ad hoc workflows. As they say: necessity is the mother of intention.

Of course, that led to another realization. I now had four hashing tools — two for MD5 (MZ and non-MZ), and two for SHA256. The “Hashing Tools” section in MalChela was getting a bit crowded.

Back to the drawing board.

The Result: Three Unified Tools

I consolidated and upgraded everything into three tools — all of which support both CLI and GUI usage.

#️⃣ MZHash (replaces mzmd5)

• Uses YARA to recursively scan for files with an MZ header (i.e., Windows executables and DLLs)

• Generates one hash file per selected algorithm: MD5, SHA1, SHA256

• Also creates a .tsv lookup file for each, mapping hashes to paths

cargo run -p mzhash /directory/to/scan -- -a MD5 -a SHA1 -a SHA256

Via GUI, you can browse to the folder and check boxes for each algorithm.

🌐 XMZHash (replaces xmzmd5)

• Uses YARA to skip over files with MZ, ZIP, or PDF headers

• Hashes everything else — ideal for surfacing Linux, Mac, or unusual samples from a mixed malware corpus

• Also supports .tsv lookup file generation

cargo run -p xmzhash /directory/to/scan -- -a MD5 -a SHA1 -a SHA256

The idea: hash what’s not obviously Windows, document-related, or un-extracted samples.

XMZHash

🔍 HashCheck

Okay, so naming might not be my strong suit. But this tool’s direct.

• Provide a hash value and a .txt or .tsv hash set

• It checks for matches, and if you’re using a .tsv, it shows the file path of the match

• Great for live triage, corpus hunting, or checking known-bads

cargo run -p hashcheck ./hashes.tsv 44d88612fea8a8f36de82e1278abb02f
Hash Check

In Summary

MalChela 2.2.1 expands its hashing toolkit with the introduction of HashCheck, MZHash, and XMZHash — giving analysts faster ways to flag known-good, isolate unknowns, and build actionable sets. In this release, we’ve also said goodbye to legacy tools, standardized output saving, and doubled down on clarity across both CLI and GUI workflows.

Download: https://github.com/dwmetz/MalChela/releases

User Guide: https://dwmetz.github.io/MalChela/

#Axiom #DFIR #Forensics #hashing #Malware #Rust #yara

Nicolas Fränkel 🇪🇺🇺🇦🇬🇪frankel@mastodon.top
2025-05-23

The Guide to #Hashing I Wish I Had When I Started

banjocode.com/post/cs/hashing

N-gated Hacker Newsngate
2025-05-17

🚀 Introducing the that measures stuff real fast, because apparently 71GB/s is a thing now. 🤔 GitHub's latest novelty, where menus and buzzwords run as fast as the hash! 🏃‍♂️💨 Forget solving real problems, let's just talk speed!
github.com/Nicoshev/rapidhash

Dawiscodawisco
2025-04-22

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst