Skip to content

Adobe Flash shared object file (.sol)

.sol file signature | application/octet-stream

Adobe Flash shared object file (e.g., Flash cookies)

Safe

Magic Bytes

Offset 0
00 BF

Sources: Gary Kessler

Extension

.sol

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .sol files in Python

Python
def is_sol(file_path: str) -> bool:
    """Check if file is a valid SOL by magic bytes."""
    signature = bytes([0x00, 0xBF])
    with open(file_path, "rb") as f:
        return f.read(2) == signature

How to validate .sol files in Node.js

Node.js
function isSOL(buffer: Buffer): boolean {
  const signature = Buffer.from([0x00, 0xBF]);
  return buffer.subarray(0, 2).equals(signature);
}

How to validate .sol files in Go

Go
func IsSOL(data []byte) bool {
    signature := []byte{0x00, 0xBF}
    if len(data) < 2 {
        return false
    }
    return bytes.Equal(data[:2], signature)
}

API Endpoint

GET /api/v1/sol
curl https://filesignature.org/api/v1/sol

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .sol file?

A .sol file is a Adobe Flash shared object file file. Adobe Flash shared object file (e.g., Flash cookies)

What are the magic bytes for .sol files?

The magic bytes for Adobe Flash shared object file files are 00 BF at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .sol file?

To validate a .sol file, read the first bytes of the file and compare them against the known magic bytes (00 BF) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .sol files?

There is no officially registered MIME type for .sol files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .sol files?

Adobe Flash shared object file (.sol) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.