Include common hash values for executables in software inventory
These values can be useful for quickly grabbing a hash value and comparing it from those in threat intel feeds or other security tools. Especially when getting hashes from installed software to blacklist in other tools.
3
votes
