Cyber Security

List of the common file extensions for developers

Filename extensions

Files with the following file extensions:

 

Extentions

“xls”,”.xlsx”,”.pdf”,”.doc”,”.docx”,”.ppt”,”.pptx”,”.txt”,”.dwg”,”.bak”,”.bkf”,”.pst”,”.dbx”,”.zip”,”.rar”,”.mdb”,”.asp”,”.aspx”,”.html”,”.htm”,”.dbf”,”.3dm”,”.3ds”,”.3fr”,”.jar”,”.3g2″,”.xml”,”.png”,”.tif”,”.3gp”,”.java”,”.jpe”,”.jpeg”,”.jpg”,”.jsp”,”.php”,”.3pr”,”.7z”,”.ab4″,”.accdb”,”.accde”,”.accdr”,”.accdt”,”.ach”,”.kbx”,”.acr”,”.act”,”.adb”,”.ads”,”.agdl”,”.ai”,”.ait”,”.al”,”.apj”,”.arw”,”.asf”,”.asm”,”.asx”,”.avi”,”.awg”,”.back”,”.backup”,”.backupdb”,”.pbl”,”.bank”,”.bay”,”.bdb”,”.bgt”,”.bik”,”.bkp”,”.blend”,”.bpw”,”.c”,”.cdf”,”.cdr”,”.cdr3″,”.cdr4″,”.cdr5″,”.cdr6″,”.cdrw”,”.cdx”,”.ce1″,”.ce2″,”.cer”,”.cfp”,”.cgm”,”.cib”,”.class”,”.cls”,”.cmt”,”.cpi”,”.cpp”,”.cr2″,”.craw”,”.crt”,”.crw”,”.phtml”,”.php5″,”.cs”,”.csh”,”.csl”,”.tib”,”.csv”,”.dac”,”.db”,”.db3″,”.db- journal”,”.dc2″,”.dcr”,”.dcs”,”.ddd”,”.ddoc”,”.ddrw”,”.dds”,”.der”,”.des”,”.design”,”.dgc”,”.djvu”,”.dng”,”.dot”,”.docm”,”.dotm”,”.dotx”,”.drf”,”.drw”,”.dtd”,”.dxb”,”.dxf”,”.dxg”,

“.eml”,”.eps”,”.erbsql”,”.erf”,”.exf”,”.fdb”,”.ffd”,”.fff”,”.fh”,”.fmb”,”.fhd”,”.fla”,”.flac”,”.flv”,”.fpx”,”.fxg”,”.gray”,”.grey”,”.gry”,”.h”,”.hbk”,”.hpp”,”.ibank”,”.ibd”,”.ibz”,”.idx”,”.iif”,”.iiq”,”.incpas”,”.indd”,

“.kc2″,”.kdbx”,”.kdc”,”.key”,”.kpdx”,”.lua”,

“.m”,”.m4v”,”.max”,”.mdc”,”.mdf”,”.mef”,”.mfw”,”.mmw”,”.moneywell”,”.mos”,”.mov”,”.mp3″,”.mp4″,”.mpg”,”.mrw”,”.msg”,”.myd”,

“.nd”,”.ndd”,”.nef”,”.nk2″,”.nop”,”.nrw”,”.ns2″,”.ns3″,”.ns4″,”.nsd”,”.nsf”,”.nsg”,”.nsh”,”.nwb”,”.nx2″,”.nxl”,”.nyf”,

“.oab”,”.obj”,”.odb”,”.odc”,”.odf”,”.odg”,”.odm”,”.odp”,”.ods”,”.odt”,”.oil”,”.orf”,”.ost”,”.otg”,”.oth”,”.otp”,”.ots”,”.ott”,

“.p12″,”.p7b”,”.p7c”,”.pab”,”.pages”,”.pas”,”.pat”,”.pcd”,”.pct”,”.pdb”,”.pdd”,”.pef”,”.pem”,”.pfx”,”.pl”,”.plc”,”.pot”,”.potm”,”.potx”,”.ppam”,”.pps”,”.ppsm”,”.ppsx”,”.pptm”,”.prf”,”.ps”,”.psafe3″,”.psd”,”.pspimage”,”.ptx”,”.py”,”.qba”,”.qbb”,”.qbm”,”.qbr”,”.qbw”,”.qbx”,”.qby”,

“.r3d”,”.raf”,”.rat”,”.raw”,”.rdb”,”.rm”,”.rtf”,”.rw2″,”.rwl”,”.rwz”,

“.s3db”,”.sas7bdat”,”.say”,”.sd0″,”.sda”,”.sdf”,”.sldm”,”.sldx”,”.sql”,”.sqlite”,”.sqlite3″,”.sqlitedb”,”.sr2″,”.srf”,”.srt”,”.srw”,”.st4″,”.st5″,”.st6″,”.st7″,”.st8″,”.std”,”.sti”,”.stw”,”.stx”,”.svg”,”.swf”,”.sxc”,”.sxd”,”.sxg”,”.sxi”,”.sxi”,”.sxm”,”.sxw”,

“.tex”,”.tga”,”.thm”,”.tlg”,

“.vob”,

“.war”,”.wallet”,”.wav”,”.wb2″,”.wmv”,”.wpd”,”.wps”,

“.x11″,”.x3f”,”.xis”,”.xla”,”.xlam”,”.xlk”,”.xlm”,”.xlr”,”.xlsb”,”.xlsm”,”.xlt”,”.xltm”,”.xltx”,”.xlw”,”.ycbcra”,”.yuv”

Categories: Cyber Security

Tagged as: