Top News


Download Free Sounds and SamplesNew Loops Free Sample Packs (Free loops and samples)

Download free sounds, free audio loops, and free audio samples. Updated for 2019, this collection of free sample packs includes hundreds of free drum one-shots, free drum loops, free analog synth samples, and free sound effects.
Get over 1 GB of free techno loops, free edm samples, free house loops, free trap samples, and free presets. Also download kits for Ableton Live, Reasons Kong, and Native Instruments Battery.

100% Royalty Free

All New Loops Free Samples are 100% royalty free to use in your songs and audio productions* Please note: These sounds are free for you to use in your songs but New Loops Limited owns full copyright. You are not allowed to redistribute any part of these packs - please link to this page.

How to Download

This is our big list of free sample packs. Each pack has it's own page where you can get more details, listen to audio demos, and download the sample packs. Click the images or links below. Bookmark this page as we update these free sounds regularly.
Be sure to check out our full, high quality professional sample packs and sound banks, all with free demos to download.

Free Trap Kit 01

Free Trap Kit (Free Trap Samples)
Here’s what you’ll find inside this pack:
  • Beats, bass, synths, and effects
  • 16 one shots samples
  • 20 audio loops
  • 4 midi files
  • Kits for Live, Reason, Battery, Kontakt

Free Trap Kit 02

Free Trap Kit (Free Trap Samples)
Here’s what you’ll find inside this pack:
  • Drums, synths, sound effects
  • 38 Trap one shots
  • 13 Trap loops 
  • 10 REX2 loops
  • 5 Midi files
  • Patches for Kontakt, Halion, NN-XT
  • Kits for Kong, Battery, Geist

Free Progressive House Loops

Free Progressive House Loops (Free House Samples)
Here’s what you’ll find inside this pack:
  • House and edm loops
  • 46 drum loops
  • 18 synth loops
  • 15 bass loops
  • 21 sound effects

Club Techno Loops

Free Club Techno Loops (Free Techno Samples)
Here’s what you’ll find inside this pack:
  • Free analog techno loops
  • 10 mini loop kits
  • 100 techno loops
  • Drums, bass, synths

Club Techno One Shots

Free Club Techno One Shots (Free Techno Samples)
Here’s what you’ll find inside this pack:
  • Free analog techno samples
  • 100 techno drum one shots
  • Kicks, claps, snare, hats, percussion

4 DA Club Free House Loops

Download 4 Da Club Free House Loops
Here’s what you’ll find inside this pack:
  • House and edm loops
  • 47 drum loops
  • 23 synth loops
  • 17 bass loops
  • 13 sound effects

    Free Acid Synths

    Download Free Acid Synths
    Here’s what you’ll find inside this pack:
    • Authentic analog acid sounds
    • 24 acid synth loops
    • 15 one shot acid samples

    Free EDM Basslines

    Download Free EDM Basslines
    Here’s what you’ll find inside this pack:
    • 25 key labelled bass loops
    • Authentic analog sounds
    • Made with analog hardware synths

    Free EDM Snare Fills

    Free EDM Snare Fills
    Here’s what you’ll find inside this pack:
    • 35 snare rolls and fills
    • 18 snare one shots
    • 19 sound effects

    Free Carnival Drums

    New Loops Free Carnival Drums
    Here’s what you’ll find inside this pack:
    • Live carnival drum sounds
    • Rhythms, fills, and hits
    • 19 drum loops
    • 30 one shots

      Free U-he Colour Copy Presets

      Download Free U-he Colour Copy Presets
      Here’s what you’ll find inside this pack:
      • 15 Colour Copy presets

      Free U-he Hive Presets

      Download Free U-he Hive Presets
      Here’s what you’ll find inside this pack:
      • 20 presets for Hive
      • Pads, basses, plucks,
      • Chords, synths, sound effects

      This Packs are most likely by Rampage Sayan. Source- NewLoops

      free sample packs for electronic music production
      If you are looking for free sample packs, look no further. This page is home to a complete list of samples that are free for the taking.
      The popularity of electronic music has exploded over the last few decades. These days anyone with the right software and equipment can make it right from their home. As a result, the web is ripe with free samples that you can use while making your own music.
      Whether you are looking for free drum, vocal, or synth samples, this list has it all! We dug through the web to find as many sample packs as we could.
      We have separated the links below into different categories to make things easier. Each category will have links to free samples. All the packs will come with multiple files, sometimes hundreds, so you will have a lot to try out in your own music.

      Free Sample Packs From Rampage Sayan.

      First of all, you’ll want to grab this free sample pack made by chart-topping bass music producer Rampage Sayan exclusivel.
      The sample pack contains reese basses, kicks, snares, atmos and FX. You can tweak these sounds and use them to create your own dubstep, drum and bass, drum step, neurofunk, neurohop or any other style of heavy bass music you like.
      They foley samples are truly awesome for adding alien-like textures over the top of your basses, drums, leads, pads and atmos. Click below to get both sample packs now:

      Free Drum Samples

      Step up the beat in your music with these free drum packs. Each pack contains multiple samples, which in total gives you over a thousand to choose from!

      Free Bass Samples

      Whether you are looking to drop the bass or just add some thump to your tracks, these free bass packs have you covered.
      Each one comes with loads of samples that are all ready to go.

      Free Lead Synth Samples

      These free synth packs give you a lot of options to try out. You will find thousands to listen to and use in your own music!

      Free Vocal Samples

      If you are looking to add some dialog to your music, these free vocal packs will help you out. There is a wide range of options to pick from, enough to cover as many tracks as you can make!
      You can also check out our complete list of free vocal samples here.

      Free Special Effects Samples

      These sound effect packs are perfect for spicing up your music. Whether you are looking to add some background effects or some extra depth, you will find hundreds of samples to choose from.

      Free Mix Sample Packs

      Sometimes the best packages are the ones that come full circle. Each of these sample packs comes with a little bit of everything, including drums, vocals, bass, and more!

      Here's some FAQ you need to know.  * For those who have bricked their device, do visit the nearest service center to repair your phone. You can't add the Mi account in the settings the device is not bootable/ boot loop.

      * For Android One users, please check out unlocking tutorial in your device subforum. You don't have to go through the procedures mentioned here.

      *Bind your Mi account and remember not to logout your Mi account from your device
      . Do manage your Mi account details (i.e: mobile number) here:

      How to apply? (new*)

      The process is simplified and the permission is granted automatically. You don't have to fill in any application form or wait for the SMS anymore. Log in and head towards . Download the Mi Unlock Tool (picture above) from the site and proceed to unlock. A waiting period and instruction will then be displayed in Mi Unlock Tool. Use your phone actively during the waiting period.

      Download Mi Unlock App (new*)
      Use this older version of Mi Unlock Tool if you're stuck with account application query error (hot*):

      Download Mi PC Suite (38.9 MB, Downloads: 136586)

      1. Settings---> About phone---> MIUI Version (Keep tapping it to enable developer option).
      2. Settings---> Additional settings---> Developer option and bind your approved Mi account under Mi Unlock Status. 
      3. Log into the Mi account which has acquired unlocking permission on your device.4. When you logged into the Mi Unlock Tool, tap on the top right gear icon to check the update for both USB driver and Mi Unlock Tool. Make sure you're running the latest version.5. Turn off your device, press the Power button and Volume - button at the same time to enter bootloader mode.6. Log into the unlocking tool on PC with the same Mi account. Connect the device to the PC using USB cable7. Press 'Unlock' and follow the timer/ waiting period shown in Mi Unlock Tool to unlock successfully.

      1. Follow the timer/ waiting period shown in Mi Unlock Tool to unlock successfully, you'll see this sentence "Couldn't unlock the device after XXXX hours" which actually means "Please unlock after XXX hours." There is some translation issue in Mi Unlock Tool.
      2. After you've successfully bound your Mi Account, do not log out the approved Mi account from your phone. Otherwise, the timer will be reset and you gotta spend more time waiting again. 
      3. Use another PC (64-bit) to unlock if MI Unlock Tool fails to detect your device/ unknown error. 

      If you're facing "Couldn't verify, please wait a minute or two/ No Network/86012/20091 " related errors when adding Mi Account in Mi Unlock Status. File a bug report via Settings---> Feedback,  attach the screenshot of the errors and the bug log directly from your phone. Don't spam the forum with multiple threads across subforum. 
      Steps to reproduce the errori. Logout your current Mi account from your phone. ii. After you removed the account, reboot your phone.iii. Then, add and bind the account again at the developer settings---> Mi Unlock Tool so that the error is reproduced.iv. Once the error message is shown, head towards dialer and dial *#*#284#*#*.  The process will take a few minutes, once the Bug Log has been generated, locate and find them in File Explorer-->Internal Storage-->MIUI-->debug_log--> Zip file with date and time. 
      Why did Mi lock the bootloader for Mi devices?
      Mi is an international brand now, but it's only in few countries currently, and is still in the stage of expanding its international market. So it's difficult for users from countries where Mi is not officially sold to buy Mi phones. Many users have taken the risk of buying from an unofficial reseller. But they sometimes get fake Mi phones, or Mi phones with unofficial ROM loaded with bloatware. You guys must have seen some users asking in the forum whether their Mi phones are genuine, or that they have weird ROM version installed on their new phones. This is really bad for user experience, and it might even cause property loss if some malware are installed. This situation also exists in China market.

      Another problem Mi users have often encountered is that, after their Mi phones are lost or stolen, the person who got the device could easily flash a new ROM into it, and makes it almost impossible for our users to get their phones back. In the recent MIUI developer version update, we've added a feature that needs users to enter their Mi account info to use the phone after doing a full wipe. But if an ill-intentioned person knows how to use fastboot method to flash ROMs, this will not stop him/her from gaining control of the phone.

      Based on the above two reasons, we've decided to lock the bootloader. We've also made changes to Mi Cloud's 'Find Device' function, and adjusted system update's verifying logic. By these combined methods, user data can be better protected, and user experience can also be improved.

      What Mi devices are locked?Mi 4c, Redmi Note 3, Mi Note Pro, Redmi 3, Mi 4S, Mi 5 and Mi devices launched in the year 2016 onwards

      How to check whether the bootloader is locked/unlocked?
      -The unlocker tool will show the message of "Unlocked".- An "Unlocked" word will be shown when booting.- Advanced users can check the bootloader status via cmd
      Flashing full ROM in unlocked bootloader will lock the bootloader again?No, the bootloader will remain unlocked unless you choose clean all and lock option during fastboot.
      What do you need to know about unlocking?
      First and foremost you can only unlock your own device. This means the unlocking tool you downloaded must be logged in with the same Mi account on your device. One Mi account could only unlock one device within 30 days
      Isn't locking bootloader against Mi's 'geek' spirit?
      Locking bootloader is aimed to provide a better user experience, which we've been trying to do the whole time. In the meantime, we've provided an unlocking tool for senior users who know their ways around flashing and tweaking their devices. 
      The unlocking procedure will need Internet access to get the unlocking password. Also, the Mi Account logged in on the Mi phone and the unlocking tool needs to be the same. Otherwise, the unlocking request will be denied. This will ensure that ill-intentioned people will not get access to your personal data.

      What will change after locking bootloader?- Locking bootloader will not affect normal OTA updates
      - ROOT will be disabled if the user has enabled it before. Enabling ROOT will need to unlock bootloader
      - Recovery mode is changed. Updating via Recovery will need to use Mi PC Suite
      - Devices with locked bootloader cannot update using Miflash. Users need to unlock bootloader if they want to flash Fastboot ROMs.

      The risks stated above do not fully cover changes which may be brought about by Mi Unlock. We will keep improving Mi Unlock in order to prevent the cases when unauthorized vendors unlock Mi devices to install third-party apps which worsen MIUI user experience and cannot to be deleted. Locked devices also provide you with high-quality security features, such as Find device, and other added-value services. We're sorry for any inconveniences our policies may cause. Please think twice before unlocking if you are not familiar with ROM flashing. 

      Final note, if you don't know that much about Android, flashing, custom ROMs etc. It's not recommended for you to unlock the bootloader. It might cause serious damage to your device or personal data.

      Q. What Is Dark Web?

      A. It is the part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

      How To Access The Dark Web Guide

      Step 1: Go and get yourself a good VPN (Virtual Private Network) here , use it ALL of the time, no matter if you are on TOR or not. This site herereviews the best VPN’s for use with TOR.
      You should be taking your anonymity and security very seriously if you are visiting the Dark Net, especially if you are viewing any Darknet Markets.
      Do not fool yourself and think that the ISP’s (Internet Service Providers) and Law Enforcement are not trying to track those who use Tor to access the Dark Web, they are, and they are good at it so don’t make it easy for them.
      It should be brought to your attention that there was a recent Tor vulnerability which leaked your REAL IP address leading back to your real location. If you already have the Tor Browser then UPDATE it immediately. Vulnerabilities like these are happening more often to Tor.
      VPN for Dark Web AccessBy using the simple VPN app, your darknet activities will be hidden from your ISP and government agencies as all of your internet usage will be encrypted. No one will even know you are using TOR, let alone browsing for darknet markets.
      What’s even better is that the VPN will give you a fake IP address, in another country if you like, so even if Tor is compromised then the trace just leads back to somewhere else that can’t be linked to you.

      The other benefit of using a VPN is to prevent hackers stealing your identity and or personal files and photos from your computer.
      You need to use a good VPN that keeps NO LOGS, fast performance, preferably accepts bitcoin as payment, has a kill switch for DNS leaks, and is compatible with TOR.

      Step 2: You can’t access the deepweb just using a common browser like Internet Explorer or Google Chrome. To get dark net access you will need to download the dark web browser called TOR browser bundle. Only get it from the official TOR website, never download it from anywhere else!
      Now close all of your browsing windows and all apps connecting to the world wide web like Google Drive, Skype, OneDrive, iCloud etc.
      Then open your VPN app and connect to another location other than where you are at, make sure to use the OpenVPN protocol as it is the most secure.
      Open up your normal favorite browser and then download TOR
      TOR Official Website: Browser Download

      Step 3: Install the TOR browser bundle on your PC or Mac. When the download is complete, double-click the downloaded file, choose the destination folder (the folder where you want to extract tor browser), and choose extract.
      Step 4: Start TOR Browser. Open the folder where you extracted TOR browser and double-click “Start Tor Browser”. The TOR start page will open in a browser window (it’s actually a portable version of FireFox stripped down).
      From here, you now have a good level of anonymity and security and you are able to gain access to .onion websites through your dark web browser.


      Next, you will want to visit a dark web site.
      Now you have dark net access you should Click HERE to view the Darknet Market List so you can visit some of the best black market websites on the DeepWeb.

      Silk Road ( Dark web screenshot )

      If you do want to check out some darknet markets then you should follow the guide for that specific market as it will show you step by step what to do to sign up, browse etc.
      If you are looking for the biggest list of hidden deep web links go hereso you can find exactly what you are looking for. (some also call them dark web links). We have compiled one of the biggest lists of tested .onion sites on the dark net complete with a search function, website name, description, categories, site status and even a screenshot of the landing page so you can see if your site is online or dead.

      Info graphic clarifies the concept of internet, surface web, deep web and dark web with examples and the metaphor of an ice berg.
      Now we have shown you how to access the dark web we have some very important tips to share…

      Bitcoin and Buying on the Dark Web:

      If you are on the dark net to buy something, and most of us are, then you will need to use cryptocurrency to do so and Bitcoin is the most used cryptocurrency on the dark web.
      Buying cryptocurrencies is another topic altogether, so we won’t go into it here but this site has made an easy to follow guide on buying bitcoin, but we will give you one GOLDEN tip on how to go under the radar and not have your crypto exchange account shut down and lose money.
      NEVER send cryptocurrency directly from your exchange account (where you buy the coins) to a market or anywhere on the dark web, also never send coins directly from anywhere on the dark net to your exchange. They are onto this right away as they can tell where the coins came from and they WILL shut you down and you will be recorded in a list for sure.
      You must send your coins from your exchange to a wallet (find out how to in the guides) then from the wallet to the dark web and vice-versa.

      Hacking on the Dark Web:

      There are a lot of dark web users that are hackers and there are even more users that want to become hackers. The dark web is the hacker’s playground, so if you don’t know what you are doing then you need to be extra careful and take the precautions we mention very seriously, like using a VPN, covering your webcam, using very good usernames and passwords etc.

      Bonus Security Steps For the DarkNet:

      Step 5: DO NOT change the TOR browser window size unless you like living dangerously. The FEDS have programs that can match identities on random things such and matching time online and other things with the browser window size, I shit you not. If you don’t change the size then it is the same as most other people.
      Step 6: Please remember that TOR isn’t necessarily 100% anonymous, you should turn off JavaScript within the dark web browser settings to help.

      Block Javascript in TOR Browser

      Step 7: Disconnect your webcam or block the camera with some black tape. Hackers and governments have ways of getting into your computer and turning on the video and cameras.
      You can have intimate images of you be used as blackmail or extortion, or even worse, used by the feds.

      Covered camera and mic?

      Step 8: Disconnect your microphone or cover it with tape to muffle it good. The same goes for the microphone as the camera, the last thing you want is to be recorded saying incriminating things at home. It doesn’t even have to be while on the dark net. Even the Facebook creator Mark Zuckerberg does it as he knows the dangers.
      Step 9: NEVER use your real name, photos, email, or even password that you have used before on the dark web. This is the fastest way to be tracked. Use an anonymous email account and aliases that have nothing to do with you that you have never used before.
      Step 10: If you are using TOR on the dark web for anything other than looking at cute pictures of kittens, you should think seriously about your privacy and security. Jolly Roger has put together a comprehensive guide on how to stay safe on the deep web, view the guide here.
      If you have read through this how to access the darknet guide and thought to yourself WTF? Then you are probably new to this and need a bit of background and information to get you up to speed. Please remember to share this post so everyone that wants to have a look on the Dark Web can do so and do it safely.

      Want Tor to really work?

      You need to change some of your habits, as some things won't work exactly as you are used to.
      1. Use Tor Browser
        Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor.
      2. Don't torrent over Tor
        Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire Tor network for everyone else.
      3. Don't enable or install browser plugins
        Tor Browser will block browser plugins such as Flash, RealPlayer, Quicktime, and others: they can be manipulated into revealing your IP address. Similarly, we do not recommend installing additional addons or plugins into Tor Browser, as these may bypass Tor or otherwise harm your anonymity and privacy.
      4. Use HTTPS versions of websites
        Tor will encrypt your traffic to and within the Tor network, but the encryption of your traffic to the final destination website depends upon on that website. To help ensure private encryption to websites, Tor Browser includes HTTPS Everywhere to force the use of HTTPS encryption with major websites that support it. However, you should still watch the browser URL bar to ensure that websites you provide sensitive information to display a blue or green URL bar button, include https:// in the URL, and display the proper expected name for the website. Also see EFF's interactive page explaining how Tor and HTTPS relate.
      5. Don't open documents downloaded through Tor while online
        Tor Browser will warn you before automatically opening documents that are handled by external applications. DO NOT IGNORE THIS WARNING. You should be very careful when downloading documents via Tor (especially DOC and PDF files, unless you use the PDF viewer that's built into Tor Browser) as these documents can contain Internet resources that will be downloaded outside of Tor by the application that opens them. This will reveal your non-Tor IP address. If you must work with DOC and/or PDF files, we strongly recommend either using a disconnected computer, downloading the free VirtualBox and using it with a virtual machine image with networking disabled, or using Tails. Under no circumstances is it safe to use BitTorrent and Tor together, however.
      6. Use bridges and/or find company
        Tor tries to prevent attackers from learning what destination websites you connect to. However, by default, it does not prevent somebody watching your Internet traffic from learning that you're using Tor. If this matters to you, you can reduce this risk by configuring Tor to use a Tor bridge relay rather than connecting directly to the public Tor network. Ultimately the best protection is a social approach: the more Tor users there are near you and the more diverse their interests, the less dangerous it will be that you are one of them. Convince other people to use Tor, too!

      Dwonload Tor For PC (FREE)