Skip to content

PGP disk image (.pgd)

.pgd file signature | application/octet-stream

PGP disk image

Safe

Magic Bytes

Offset 0
50 47 50 64 4D 41 49 4E

Sources: Gary Kessler

Extension

.pgd

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .pgd files in Python

Python
def is_pgd(file_path: str) -> bool:
    """Check if file is a valid PGD by magic bytes."""
    signature = bytes([0x50, 0x47, 0x50, 0x64, 0x4D, 0x41, 0x49, 0x4E])
    with open(file_path, "rb") as f:
        return f.read(8) == signature

How to validate .pgd files in Node.js

Node.js
function isPGD(buffer: Buffer): boolean {
  const signature = Buffer.from([0x50, 0x47, 0x50, 0x64, 0x4D, 0x41, 0x49, 0x4E]);
  return buffer.subarray(0, 8).equals(signature);
}

How to validate .pgd files in Go

Go
func IsPGD(data []byte) bool {
    signature := []byte{0x50, 0x47, 0x50, 0x64, 0x4D, 0x41, 0x49, 0x4E}
    if len(data) < 8 {
        return false
    }
    return bytes.Equal(data[:8], signature)
}

API Endpoint

GET /api/v1/pgd
curl https://filesignature.org/api/v1/pgd

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .pgd file?

A .pgd file is a PGP disk image file. PGP disk image

What are the magic bytes for .pgd files?

The magic bytes for PGP disk image files are 50 47 50 64 4D 41 49 4E at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .pgd file?

To validate a .pgd file, read the first bytes of the file and compare them against the known magic bytes (50 47 50 64 4D 41 49 4E) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .pgd files?

There is no officially registered MIME type for .pgd files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .pgd files?

PGP disk image (.pgd) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.