Microsoft Reader eBook file (.lit)
.lit file signature | application/octet-stream
Microsoft Reader eBook file
Magic Bytes
Offset 0
49 54 4F 4C 49 54 4C 53
Sources: Gary Kessler
Extension
.lit
MIME Type
application/octet-stream
Byte Offset
0
Risk Level
Safe
Validation Code
How to validate .lit files in Python
def is_lit(file_path: str) -> bool:
"""Check if file is a valid LIT by magic bytes."""
signature = bytes([0x49, 0x54, 0x4F, 0x4C, 0x49, 0x54, 0x4C, 0x53])
with open(file_path, "rb") as f:
return f.read(8) == signature
How to validate .lit files in Node.js
function isLIT(buffer: Buffer): boolean {
const signature = Buffer.from([0x49, 0x54, 0x4F, 0x4C, 0x49, 0x54, 0x4C, 0x53]);
return buffer.subarray(0, 8).equals(signature);
}
How to validate .lit files in Go
func IsLIT(data []byte) bool {
signature := []byte{0x49, 0x54, 0x4F, 0x4C, 0x49, 0x54, 0x4C, 0x53}
if len(data) < 8 {
return false
}
return bytes.Equal(data[:8], signature)
}
API Endpoint
/api/v1/lit
curl https://filesignature.org/api/v1/lit
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .lit file?
A .lit file is a Microsoft Reader eBook file file. Microsoft Reader eBook file
What are the magic bytes for .lit files?
The magic bytes for Microsoft Reader eBook file files are 49 54 4F 4C 49 54 4C 53 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .lit file?
To validate a .lit file, read the first bytes of the file and compare them against the known magic bytes (49 54 4F 4C 49 54 4C 53) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .lit files?
There is no officially registered MIME type for .lit files. Systems typically use application/octet-stream as a generic fallback when handling this format.
Is it safe to open .lit files?
Microsoft Reader eBook file (.lit) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.