Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
This library was created to simplify the concept of a hash table and explain how it works in the background in a clear and simple way, especially for beginners in data structures.
You can install hashtbl
via pip:
pip install hashtbl
from hashtbl import hashMap
x = hashMap(
[
["key1", "value1"],
["key2", "value2"],
["key3", "value3"],
]
)
print(x)
{"key1": "value1", "key2": "value2", "key3": "value3"}
from hashtbl import hashMap
x = hashMap(
[
["key1", "value1"],
["key2", "value2"],
["key3", "value3"],
],
detail=True,
)
print(x)
Hash function :
_____________
f(x) = ord(x) % N (Hash table capacity)
Example :
_______
N = 26
f("ABC") = ord("ABC") % 26 = (ord('A') + ord('B') + ord('C')) % 26 = (65 + 66 + 67) % 26 = 198 % 26 = 16
The value associated with the key "ABC" will be placed at index 16 in the hash table (array) with a capacity of 26.
Notes :
_____
- If a key has the same index as an existing key in the hash table, it will be placed after it because, in a hash table, each index is a linked list.
- If a key is duplicated in the hash table, the last value associated with this key will be saved.
Hash Table :
__________
╒════════╤════════════════════════════════╤══════════╕
│ Key │ Hash function Output (Index) │ Value │
╞════════╪════════════════════════════════╪══════════╡
│ "key1" │ 14 │ "value1" │
├────────┼────────────────────────────────┼──────────┤
│ "key2" │ 15 │ "value2" │
├────────┼────────────────────────────────┼──────────┤
│ "key3" │ 16 │ "value3" │
╘════════╧════════════════════════════════╧══════════╛
from hashtbl import hashMap
x = hashMap(
[
["algorithm", "algo"],
["logarithm", "log"],
],
detail=False,
)
# When the keys are 'algorithm' and 'logarithm', 5 is the output index of the hash function. You can view this index and all other key indexes by printing with all details (detail=True).
print(x.get_linked_list(5))
[('algorithm', 'algo')] -> [('logarithm', 'log')] -> None (NULL)
from hashtbl import hashMap
x = hashMap(
[
["algorithm", "algo"],
["logarithm", "log"],
],
detail=True,
)
# When the keys are 'algorithm' and 'logarithm', 5 is the output index of the hash function. You can view this index and all other key indexes by printing with all details (detail=True).
print(x.get_linked_list(5))
╒═══════════════════════╤═════════════════════════╤══════════════════════╤══════════════════════╕
│ Current Value │ Current Value @ddress │ Next Value │ Next Value @ddress │
╞═══════════════════════╪═════════════════════════╪══════════════════════╪══════════════════════╡
│ ('algorithm', 'algo') │ 0x7f527dd225d0 │ ('logarithm', 'log') │ 0x7f527dd21d50 │
├───────────────────────┼─────────────────────────┼──────────────────────┼──────────────────────┤
│ ('logarithm', 'log') │ 0x7f527dd21d50 │ None (NULL) │ 0x95bcc0 (nil/0x0) │
├───────────────────────┼─────────────────────────┼──────────────────────┼──────────────────────┤
│ None (NULL) │ 0x95bcc0 (nil/0x0) │ │ │
╘═══════════════════════╧═════════════════════════╧══════════════════════╧══════════════════════╛
You can use all methods of the built-in hash table (dictionary) with this custom hash table.
This project is licensed under the MIT LICENSE - see the LICENSE for more details.
FAQs
Sophisticate Hash Table
We found that hashtbl demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.