Skip to content

Phishing-Database/checksums

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Checksums

This repository provides checksum files for the Phishing.Database project. These checksums ensure the integrity of the files published or updated as part of the project.

Format

Each time a new file is published to phish.co.za or an existing file is updated in the Phishing Database project, the corresponding checksum files are updated or published in this repository.

These files follow these naming conventions, where filename refers to the file you want to verify:

  • filename.md5
  • filename.sha1
  • filename.sha256
  • filename.sha512

Usage

For every file in the Phishing Database project, you can find its associated checksum files in this repository. These checksum files can be used to verify the integrity and authenticity of the downloaded files.

Linux

Use the following commands to verify a file against its checksum:

  • MD5:
    md5sum -c filename.md5
  • SHA1:
    sha1sum -c filename.sha1
  • SHA256:
    sha256sum -c filename.sha256
  • SHA512:
    sha512sum -c filename.sha512

macOS

On macOS, you can use the following commands in the Terminal. The shasum command supports multiple algorithms via the -a flag:

  • MD5:

    md5 filename

    Compare the output with the contents of filename.md5.

  • SHA1:

    shasum -a 1 filename

    Compare the output with the contents of filename.sha1.

  • SHA256:

    shasum -a 256 filename

    Compare the output with the contents of filename.sha256.

  • SHA512:

    shasum -a 512 filename

    Compare the output with the contents of filename.sha512.

Windows

  1. Open Command Prompt (CMD).
  2. Navigate to the folder containing the file and checksum.
  3. Run the following commands:
  • MD5:
    certutil -hashfile filename MD5
  • SHA1:
    certutil -hashfile filename SHA1
  • SHA256:
    certutil -hashfile filename SHA256
  • SHA512:
    certutil -hashfile filename SHA512

Compare the output of the above commands with the content of the checksum files to ensure integrity.

Authors

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks