FAQ

Since November 2003, we have been steadily gathering, analyzing and hashing all forms of computer files including the installations of over 800+ operating system versions (Windows, Linux, macOS, BSD, etc).  We have done this to fill a need within the CyberSecurity and Digital Forensic communities.  Since there are costs associated with maintaining a service like this we offer the Professional Hash Sets at a very reasonable price.  The Professional Membership allows immediate access to download the Professional Level Hash Sets in ZIP/CD/DVD.  Additionally, Subscription Members receive full access to our 24 hour search engines for research and validation of the data within our hash sets. 

A.  This is our combined hash sets reflecting over 800+ installed operating system versions (MS Windows, Linux, macOS, BSD and Solaris), millions of other software product files, third-party manufacturer hardware and software file drivers.  We also keep the operating system files updated continually with the latest OS updates, fixes, patches, etc.

A.  Our hash sets are derived from three processes:

  1. Installing operating systems (MS Windows, Linux, macOS, BSD, etc) and then later updating those same operating systems with standard public released updates, fixes, patches, etc.
  2. Installing and/or decompressing and extracting the contents from many third-party software products (i.e. installation files, manufacturer drivers, Windows App Store, Mac App Store, etc).
  3. Collections of other files from around the globe via the Internet.

Since many of our members use the US Government’s NSRL Datasets (hash values) and we want our hash sets to complement the US Government’s hash values we proactively remove ‘known’ US Government hash values from our hash sets.  The remaining hash values are labeled similar to “… without known NSRL”.   Consider this ‘thinking ahead’ to speed up your computer forensic hash analysis.  Of course, if you are not using the US Governments hashes then our full hash sets will still certainly work.  Please remember that you could be missing some ‘known’ hash values if not already using the US Government’s hash values.

A.  Yes, we do offer tab delimited data file dumps (exports) of our entire database tables which offers not only MD5, SHA-1 and SHA-256 hash values but all the associated computer file metadata such as file names, file and folder directories, file timestamps (Modified/Accessed/Created), first 32 bytes in hex format of each file, first 128 bytes ASCII (strings), website and/or manufacturer names and much more.  You can see the pricing under our signup page or within your membership portal page. Just look for Platinum Subscription – 90 Days Access.

A.  We accept electronic payment on our website via PayPal and PayPro Global.  Each accepts most common credit and debit card payments.  Once payment is received your membership will be adjusted immediately giving you access to the hash sets.

“Platinum Subscription” means paid membership that includes access to periodic releases of prebuilt MD5, SHA-1 and SHA-256 Hash Sets via electronic download in ZIP/CD/DVD format, PLUS continuous releases of the newest ‘The Hash Search Engine Database Dumps’ (includes tab delimited table exports and SQL, MySQL, Oracle and PostgreSQL import table script templates), optional use of the aforementioned for third-party product and/or software redistribution use only. Privately or publicly redistributing the contents of the database tables and/or prebuilt Hash Sets in similar or dissimilar form, directly or indirectly in competition with Whitehat Computer Forensics LLC and HashSets.com is prohibited.  After the one year access you are granted continued lifetime use of the previously provided hash sets and database dumps for the same previously approved purposes.

We gather all computer files directly from the websites of operating system, software and hardware manufacturers.  For example we go to Microsoft’s website to download Microsoft Windows operating system versions.  The same is true for macOS (Apple.com), Linux distributions and BSD operating systems. We also go directly to IBM, Dell, Apache, Oracle, etc, to gather publicly accessible software programs and utilities.   Within our Search Engines we provide a “website” column where it references the source website the file was gathered from.