malware source code
Ctrlk
  • Introduction
  • Code base
    • Headers
    • CRT Recreation
  • String Hashing
    • Djb2
    • Djb2a
    • FowlerNollVoVariant1a 32
    • JenkinsOneAtATime32Bit
    • FowlerNollVoVariant1a 64
    • LoseLose
    • Murmur3
    • Sdbm
    • SipHash
    • SuperFastHash
    • Pjw
    • XXHash
    • Crc32NoTable
    • Rotr32 Add 13
    • Rotr32 Add 7
    • Lookup3
    • Jhash
  • Antidebugging Methods
  • Library Loading
  • Error Handling
  • Fingerprinting
  • Wrappers and Helpers
  • Process Creation Techniques
  • Shellcode Execution
  • Compression
  • Networking
  • Lsass Related
  • Proxied Functions
  • Evasion
  • Component Object Model
  • My Projects
    • Proof-of-Concepts
    • Write-ups
Powered by GitBook
On this page

String Hashing

Djb2Djb2aFowlerNollVoVariant1a 32JenkinsOneAtATime32BitFowlerNollVoVariant1a 64LoseLoseMurmur3SdbmSipHashSuperFastHashPjwXXHashCrc32NoTableRotr32 Add 13Rotr32 Add 7Lookup3Jhash
PreviousImplZeroMemory2NextDjb2

Last updated 6 hours ago