Computer Forensics Tools & Techniques Catalog

Entering tool / technique information

You have selected to enter information for a Hash Analysis tool / technique. If this is correct, please enter the requested information in the fields below. If this is incorrect, please select the correct functionality/tool type from the menu bar on the left.
(Note: some tools perform multiple forensic functions. Such tools will need to be submitted multiple times, once for each function they support.)

Contact information

Your name:
Your email address:

General tool / technique information

Tool / technique name:
Release date:
URL to tool / technique description:
Developer name:
Developer website URL:
Available test reports  (e.g., report title + where or from whom it may be obtained; use semicolons for multiple reports):

Detailed tool / technique information

Select the parameter values that best describe the tool / technique. Ctrl-click (Cmd-click for Macs) to select multiple values for a parameter.

Forensic Functionality:Hash Analysis
Technical Parameters: Tool host OS / runtime environment: Hash computation: Supported hash algorithms: Create and manage hashsets: Hash search- use of hashes or hash sets to identify files/objects of interest: Hash elimination- use of hash sets to filter out files/objects (e.g., "known good" or "known benign" files): Hash de-duplication- use of hashes to eliminate identical files/objects: