Awesome
Checksums
This repository provides checksum files for the Phishing.Database project. These checksums ensure the integrity of the files published or updated as part of the project.
Format
Each time a new file is published to phish.co.za or an existing file is updated in the Phishing Database project, the corresponding checksum files are updated or published in this repository.
These files follow these naming conventions, where filename
refers to the file you want to verify:
filename.md5
filename.sha1
filename.sha256
filename.sha512
Usage
For every file in the Phishing Database project, you can find its associated checksum files in this repository. These checksum files can be used to verify the integrity and authenticity of the downloaded files.
Linux
Use the following commands to verify a file against its checksum:
- MD5:
md5sum -c filename.md5
- SHA1:
sha1sum -c filename.sha1
- SHA256:
sha256sum -c filename.sha256
- SHA512:
sha512sum -c filename.sha512
macOS
On macOS, you can use the following commands in the Terminal. The shasum
command supports multiple algorithms via the -a
flag:
-
MD5:
md5 filename
Compare the output with the contents of
filename.md5
. -
SHA1:
shasum -a 1 filename
Compare the output with the contents of
filename.sha1
. -
SHA256:
shasum -a 256 filename
Compare the output with the contents of
filename.sha256
. -
SHA512:
shasum -a 512 filename
Compare the output with the contents of
filename.sha512
.
Windows
- Open Command Prompt (CMD).
- Navigate to the folder containing the file and checksum.
- Run the following commands:
- MD5:
certutil -hashfile filename MD5
- SHA1:
certutil -hashfile filename SHA1
- SHA256:
certutil -hashfile filename SHA256
- SHA512:
certutil -hashfile filename SHA512
Compare the output of the above commands with the content of the checksum files to ensure integrity.
Authors
-
Mitchell Krog (@mitchellkrogza) - Support @mitchellkrogza on Ko-fi!
-
Nissar Chababy (@funilrys) - Sponsor @funilrys via GitHub Sponsors!
-
Phishing Database Contributors