Since November 2003, we have been steadily gathering, analyzing and hashing all forms of computer files including the installations of over 600+ operating system versions (Windows, Linux, macOS, BSD, etc). We have done this to fill a need within the Computer Forensic and Computer Security communities. Since there are costs associated with maintaining a service like this we offer the Professional Hash Sets at a very reasonable price. The Professional Membership allows immediate access to download the Professional Level Hash Sets in ZIP/CD/DVD. Additionally, Subscription Members receive full access to our 24 hour search engines for research and validation of the data within our hash sets.
A. This is our combined hash sets reflecting over 600+ installed operating system versions (MS Windows, Linux, macOS, BSD and Solaris), millions of other software product files, third-party manufacturer hardware and software file drivers. We also keep the operating system files updated continually with the latest OS updates, fixes, patches, etc.
A. Our hash sets are derived from three processes:
- Installing operating systems (MS Windows, Linux, macOS, BSD, etc) and then later updating those same operating systems with standard public released updates, fixes, patches, etc.
- Installing and/or decompressing and extracting the contents from many third-party software products (i.e. installation files, manufacturer drivers, Windows App Store, Mac App Store, etc).
- Collections of other files from around the globe via the Internet.
Since many of our members use the US Government’s NSRL Datasets (hash values) and we want our hash sets to complement the US Government’s hash values we proactively remove ‘known’ US Government hash values from our hash sets. The remaining hash values are labeled similar to “… without known NSRL”. Consider this ‘thinking ahead’ to speed up your computer forensic hash analysis. Of course, if you are not using the US Governments hashes then our full hash sets will still certainly work. Please remember that you could be missing some ‘known’ hash values if not already using the US Government’s hash values.
A. Yes, we do offer tab delimited data file dumps (exports) of our entire database tables which offers not only MD5, SHA-1 and SHA-256 hash values but all the associated computer file metadata such as file names, file and folder directories, file timestamps (Modified/Accessed/Created), first 32 bytes in hex format of each file, first 128 bytes ASCII (strings), website and/or manufacturer names and much more. You can see the pricing under our signup page or within your membership portal page. Just look for Platinum Service – One Year Access.
A. We accept electronic payment on our website via PayPal and 2Checkout. Each accepts most common credit and debit card payments. Once payment is received your membership will be adjusted immediately giving you access to the hash sets.
“Single User Membership” means paid membership that grants one user the right to access the website and use the periodic releases of prebuilt MD5, SHA-1 and SHA-256 Hash Sets via electronic download in ZIP/CD/DVD format, and thereafter-continued lifetime use of the previously provided Hash Sets by the same Single User only. You are granted authorization to use the prebuilt Hash Sets on any number of machines as long as that same same user is the only user. Privately or publicly redistributing the contents of prebuilt hash sets in similar or dissimilar form, directly or indirectly in competition with Whitehat Computer Forensics LLC and HashSets.com is prohibited.
“Multi User Office” means paid membership that grants more than one user within a single office (usually a building or portion of a building where a company conducts its business e.g. main office, home office, field or branch office) the right to access the website for a period of one year and use periodic releases of prebuilt MD5, SHA-1 and SHA-256 Hash Sets via electronic download in ZIP/CD/DVD format, and thereafter-continued lifetime use of the previously provided Hash Sets by the same single office users. You are granted to use the prebuilt Hash Sets on any number of machines as long as the users are within the same single office. Privately or publicly redistributing the contents of prebuilt hash sets in similar or dissimilar form, directly or indirectly in competition with Whitehat Computer Forensics LLC and HashSets.com is prohibited.
“Bronze Service” means paid membership that grants one user the right to access the website for a period of one year and use the periodic releases of prebuilt MD5, SHA-1 and SHA-256 Hash Sets via electronic download in ZIP/CD/DVD format for your third-party product and/or software redistribution use only (privately or publicly redistributing the contents of prebuilt hash sets in similar or dissimilar form, directly or indirectly in competition with Whitehat Computer Forensics LLC and HashSets.com is prohibited). Thereafter-continued lifetime use of the previously provided Hash Sets for the same approved purposes.
“Platinum Service” means paid membership that includes access to periodic releases of prebuilt MD5, SHA-1 and SHA-256 Hash Sets via electronic download in ZIP/CD/DVD format, PLUS continuous releases of the newest ‘The Hash Search Engine Database Dumps’ (includes tab delimited table exports and SQL, MySQL, Oracle and PostgreSQL import table script templates), optional use of the aforementioned for third-party product and/or software redistribution use only. Privately or publicly redistributing the contents of the database tables and/or prebuilt Hash Sets in similar or dissimilar form, directly or indirectly in competition with Whitehat Computer Forensics LLC and HashSets.com is prohibited. After the one year access you are granted continued lifetime use of the previously provided hash sets and database dumps for the same previously approved purposes.
We gather all computer files directly from the websites of operating system, software and hardware manufacturers. For example we go to Microsoft’s website to download Microsoft Windows operating system versions. The same is true for macOS (Apple.com), Linux distributions and BSD operating systems. We also go directly to IBM, Dell, Apache, Oracle, etc, to gather publicly accessible software programs and utilities. Within our Search Engines we provide a “website” column where it references the source website the file was gathered from.