Tag

Binary Operations

2 views collected around this technical thread.

php中文网 Courses
php中文网 Courses
May 23, 2022 · Information Security

Implementing the SHA-256 Hash Algorithm in PHP from Scratch

This article explains the theory behind cryptographic hash functions and provides a complete PHP implementation of the SHA‑256 algorithm, detailing each processing step—from converting strings to binary to final compression—along with supporting helper functions and reference tables.

Binary OperationsInformation SecuritySHA-256
0 likes · 19 min read
Implementing the SHA-256 Hash Algorithm in PHP from Scratch
Python Programming Learning Circle
Python Programming Learning Circle
May 21, 2021 · Information Security

Python for Hackers: Environment Setup, Essential Packages, and Network Interaction

This guide explains why Python is the de‑facto language for vulnerability development, covering environment isolation with virtualenv/venv, package installation via pip, key libraries for networking, binary manipulation, encoding, and introduces pwntools for exploit creation.

Binary OperationsPythonVulnerability Development
0 likes · 8 min read
Python for Hackers: Environment Setup, Essential Packages, and Network Interaction