Edit product



This zine discusses about Hashing which is a technique of string modification of any length to the sequence of characters of fixed length, that might have various use cases. Those use cases could be storing passwords, Message authentication checks, downloaded file checks, etc.

If you are a hacker/bug bounty hunter, getting to know Hashing Techniques really helps.

Needless to say, it is in a very easy-to-understand, comical form.

You can read it on your phone and laptop, can read it before your interview for a quick refresh, stick it to your desk for reference, and much more.

Read More Zines @ securityzines.com

8 ratings

  • What is hashing, MD5 Hashing, SHA1, SHA2, SHA3, Merkel Demgard, Keccack Sponge Construction, Salting, Attacks on Hashing techniques - Rainbow tables.
  • Size63.6 MB
  • Length28 pages



Enter your info to complete your purchase


···· ···· ···· 4242
Test card



Use a different card?


pp paypal

or pay with

We do not keep any of your sensitive credit card information on file with us unless you ask us to after this purchase is complete.

or pay with

Your purchase was successful!

We charged your card and sent you a receipt


    Good news! Since you already have a Gumroad account, it's also been added to your library.

    Powered by Gumroad