Skip to main content

Day 15: Decode String: stack - leetcode - Python3

 Given an encoded string, return its decoded string.

The encoding rule is: k[encoded_string], where the encoded_string inside the square brackets is being repeated exactly k times. Note that k is guaranteed to be a positive integer.

You may assume that the input string is always valid; there are no extra white spaces, square brackets are well-formed, etc. Furthermore, you may assume that the original data does not contain any digits and that digits are only for those repeat numbers, k. For example, there will not be input like 3a or 2[4].

The test cases are generated so that the length of the output will never exceed 105.

Example 1:

Input: s = "3[a]2[bc]"
Output: "aaabcbc"

Example 2:

Input: s = "3[a2[c]]"
Output: "accaccacc"

Example 3:

Input: s = "2[abc]3[cd]ef"
Output: "abcabccdcdcdef"

Constraints:

  • 1 <= s.length <= 30
  • s consists of lowercase English letters, digits, and square brackets '[]'.
  • s is guaranteed to be a valid input.
  • All the integers in s are in the range [1, 300].
SOLUTION:
class Solution:
    def decodeString(self, s: str) -> str:
        stack: List[int] = []

        for i in s:
            if i !=  "]":
                stack.append(i)
            else:
                string: str = ""
                while stack[-1] != "[":
                    string = stack.pop() + string

                stack.pop() #pop "["
               
                k: str = ""
                while stack and stack[-1].isdigit():
                    k = stack.pop() + k

                stack.append(int(k) * string)

        return "".join(stack)


Time Complexity: O(n)

Space Complexity: O(n)


How it works:

  1. Initialize an empty stack and iterate over each character i in the input string s.

  2. If the current character i is not equal to "]", it means it is a character that needs to be processed. In this case, the character is pushed onto the stack.

  3. If the current character i is equal to "]", it indicates that a substring needs to be repeated. The code enters an inner loop.

  4. Inside the inner loop, the code pops characters from the stack until it encounters the corresponding opening bracket "[". During this process, each character is concatenated with the string variable in reverse order. This step extracts the substring that needs to be repeated.

  5. After the inner loop, the opening bracket "[" is popped from the stack to remove it.

  6. Next, another loop is executed while there are characters left in the stack and the top character is a digit. This loop extracts the number of times the substring should be repeated. Each digit character is concatenated with the k variable in reverse order.

  7. After the second loop, the code calculates the result of the repetition by multiplying the integer value of k with the string substring.

  8. The resulting repeated substring is pushed back onto the stack.

  9. Finally, after iterating through all the characters in the input string s, the code joins the elements in the stack to form a single string and returns it as the decoded result.


Comments

Popular posts from this blog

Bug Boundy Methodology, Tools & Resources

Start by defining a clear objective, such as exploiting a remote code execution (RCE) vulnerability or bypassing authentication on your target. Then, consider how you can achieve this goal using various attack vectors like XSS, SSRF, or others - these are simply tools to help you reach your objective. Use the target as how a normal user would, while browsing keep these questions in mind: 1)How does the app pass data? 2)How/where does the app talk about users? 3)Does the app have multi-tenancy or user levels? 4)Does the app have a unique threat model? 5)Has there been past security research & vulnerabilities? 6)How does the app handle XSS, CSRF, and code injection?

Install & set up mitmweb or mitmproxy in Linux

Step 1: Go to the mitmproxy page and download the binaries. Step 2: Install the downloaded tar file with the command " tar -xzf <filename>.tar.gz " Step 3: In the FoxyProxy add the proxy 127.0.0.1:8080  and turn it on. Step 4 : In the terminal run command " ./mitmweb " Step 5: Go to the page  http://mitm.it/   and download the mitmproxy's Certificate. Step 6: If you downloaded the certificate for Firefox, then go to " settings -> Privacy & Security -> Click View Certificates -> Click  Import ", then import the certificate.  Step 7: Now you are ready to capture the web traffic. Step 8 : In terminal run " ./mitmweb"

API Bug Bounty Hunting: Reconnaissance and Reverse Engineering an API

  In order to target APIs, you must first be able to find them.APIs meant for consumer use are meant to be easily discovered. Typically, the API provider will market their API to developers who want to be consumers. So, it will often be very easy to find APIs, just by using a web application as an end-user. The goal here is to find APIs to attack and this can be accomplished by discovering the API itself or the API documentation. Bug Boundy Methodology, Tools & Resources Start by defining a clear objective, such as exploiting a remote code execution (RCE) vulnerability or bypassing… adithyakrishnav.blogspot.com Reconnaissance Passive Reconnaissance It is obtaining information about a target without directly interacting with the target’s systems. Google Dorking Firstly, google search for “<app name> API”. intitle:” api” site:”google.com” inurl:”/api/v2" site:”google.com” inurl:”/api/v1" intext:”index of /” inurl:json site:”google.com” intitle:”index.of” intext:”api.t...