Tryout Sample Hash Sets (Free)

Sample Tryout Hash Sets

1,000 Row Samples
Release Date: 15 November 2016
Source: Whitehat Computer Forensics, LLC

Format: Encase, FTK, Sleuth Kit, SMART, X-Ways, Raw MD5/SHA1/SHA256
Total Hashes: 1,000 Samples Each

Duplicate Hashes Removed: Yes
NSRL Known: Yes
NSRL Unknown: Yes

The attached zip files contain a sampling (1,000 rows only) of:

(1) Operating system hash sets. Specifically, 1,000 row sample from each category of operating system (MS Windows, Linux, BSD, Solaris and macOS formerly known as OS X). This includes both desktop and server operating system hash values.

(2) MS Windows App Store hash sets. Specifically, 1,000 row sample from MS Windows App Store applications that were installed, analyzed and then subsequent hash values (MD5/SHA1/SHA256) were gathered.

(3) macOS App Store hash sets. Specifically, 1,000 row sample from macOS (formerly OS X) App Store applications that were installed, analyzed and then subsequent hash values (MD5/SHA1/SHA256) were gathered.

(4) Third-party Computer Software and Hardware Manufacturer drivers and other common software applications - Specifically, 1,000 row sample from the aforementioned wherein during analysis and the subsequent hashing process the files were first decompressed, unpacked and/or expanded to allow for further gathering of as many hash values (MD5/SHA1/SHA256) as possible. Further, these software and hardware drivers encompass varous common operating systems if published by the third-pary manufacturers.

(5) White hash sets. Specifically, 1,000 row sample from one VERY large single file containing all file hash values we have gathered since 2003 which are known to be safe, trusted, known-good and non-threatening. Basically, all of the items listed directly above (1 - 4) in a very large single file with all duplicate hash values removed to help speed up processing on your side.

(6) Black or Gray hash sets. Specifically, 1,000 row sample from a much larger single file containing all file hash values we have gathered since 2003 where we identified possible 'Notable', 'Suspicious' or 'Significant' files involving possibly malicious and/or unwanted software, utilities or files on a computer system and/or network.

Note: To see and download a sampling of these hash sets please register as a free 'Tryout Member'.