FAQ

Since November 2003, we have been steadily gathering, analyzing and hashing all forms of computer files including the installations of over 800+ operating system versions (Windows, Linux, macOS, BSD, etc).  We have done this to fill a need within the CyberSecurity and Digital Forensic communities.  Since there are costs associated with maintaining a service like this we offer the Professional Hash Sets at a very reasonable price.  The Professional Membership allows immediate access to download the Professional Level Hash Sets in ZIP/CD/DVD.  Additionally, Subscription Members receive full access to our 24 hour search engines for research and validation of the data within our hash sets. 

A.  Rolling Hash Sets are the latest hash values (raw MD5/SHA1/SHA256) we recently identified and gathered during our digital forensic analysis of various operating systems (new installations/updates/patches/etc), third-party verified applications, and so on. We make these available temporarily until we complete the next ‘Full Hash Sets’ release.  These hash values are also contained within our online ‘Hash Search Engine(s)’ for current subscription members.   

So, when you visit our website and you see no recent “Full Hash Sets” release then quickly look on this “Rolling Hash Sets” page and download these smaller and newer hash values and add to our previous “Full Hash Set” release. 

A.  ‘Full Hash Set’ releases are all past and recent hash values combined together into individual Hash Sets (e.g. Raw MD5/SHA1/SHA256 sets, OpenText Encase, Exterro Forensic ToolKit, X-Ways Forensics, Autopsy/Sleuthkit, and our complete Database Export tables (available to Platinum Subscribers only).

To summarize: If you do not see a very recent ‘Full Hash Sets’ release then we suggest downloading all the last ‘Full Hash Sets’ release and all ‘Rolling Hash Sets’ from that date forward until we release the next ‘Full Hash Sets’. 

A.  This is our combined hash sets reflecting over 800+ installed operating system versions (MS Windows, Linux, macOS, BSD and Solaris), millions of other software product files, third-party manufacturer hardware and software file drivers.  We also keep the operating system files updated continually with the latest OS updates, fixes, patches, etc.

A.  Our hash sets are derived from three processes:

  1. Installing operating systems (MS Windows, Linux, macOS, BSD, etc) and then later updating those same operating systems with standard public released updates, fixes, patches, etc.
  2. Installing and/or decompressing and extracting the contents from many third-party software products (i.e. installation files, manufacturer drivers, Windows App Store, Mac App Store, etc).
  3. Collections of other files from around the globe via the Internet.

Since many of our members use the US Government’s NSRL Datasets (hash values) and we want our hash sets to complement the US Government’s hash values we proactively remove ‘known’ US Government hash values from our hash sets.  The remaining hash values are labeled similar to “… without known NSRL”.   Consider this ‘thinking ahead’ to speed up your computer forensic hash analysis.  Of course, if you are not using the US Governments hashes then our full hash sets will still certainly work.  Please remember that you could be missing some ‘known’ hash values if not already using the US Government’s hash values.

A.  Yes, we do offer tab delimited data file dumps (exports) of our entire database tables which offers not only MD5, SHA-1 and SHA-256 hash values but all the associated computer file metadata such as file names, file and folder directories, file timestamps (Modified/Accessed/Created), first 32 bytes in hex format of each file, first 128 bytes ASCII (strings), website and/or manufacturer names and much more.  You can see the pricing under our signup page or within your membership portal page. Just look for Platinum Subscription – 90 Days Access.

A.  We accept electronic payment on our website via PayPal, PayPro Global and Purchase Orders.  PayPal and PayPro Global accepts most common credit and debit card payments.  Once payment is received your membership will be adjusted immediately giving you access to the hash sets.

“Platinum Subscription” means paid membership that includes access to periodic releases of prebuilt MD5, SHA-1 and SHA-256 Hash Sets via electronic download in ZIP/CD/DVD format, PLUS continuous releases of the newest ‘The Hash Search Engine Database Dumps’ (includes tab delimited table exports and SQL, MySQL, Oracle and PostgreSQL import table script templates), optional use of the aforementioned for third-party product and/or software redistribution use only. Privately or publicly redistributing the contents of the database tables and/or prebuilt Hash Sets in similar or dissimilar form, directly or indirectly in competition with Whitehat Computer Forensics LLC and HashSets.com is prohibited.  After the one year access you are granted continued lifetime use of the previously provided hash sets and database dumps for the same previously approved purposes.

We gather all computer files directly from the websites of operating system, software and hardware manufacturers.  For example we go to Microsoft’s website to download Microsoft Windows operating system versions.  The same is true for macOS (Apple.com), Linux distributions and BSD operating systems. We also go directly to IBM, Dell, Apache, Oracle, etc, to gather publicly accessible software programs and utilities.   Within our Search Engines we provide a “website” column where it references the source website the file was gathered from.