Datasets:

Modalities:
Text
Formats:
json
Languages:
English
Size:
< 1K
Tags:
code
Libraries:
Datasets
pandas
License:
password
stringlengths
12
12
hash
stringlengths
64
64
Y(,FCOM|6sM:
9a81a9504dfb83b81c7e1cab2a284b7f8ae810bc5937a22a74b64dec0d4fa903
wzFN_)yw+[Sg
f33380c888d714be809aae1dcd13ee012f3fc0950ae7019c309281ef2351d111
y`53jMLVrz-W
ff5e9e8cf35ef9bf27c66b8541f40949a5b266655204a038a58ee309c1197400
;R~b{H|;JLnj
b021a3ad1941125bace95279c6595cf46d405e7b4377d7c0f145a514cfd5d1b5
)hYXLHYeMvZI
f65d71fc5ee86df437b36449d4cb7670f646967c8015c72c242c453d4822fa96
?4E0X;g(;"f#
884f36220c54f0aaca2fcd66cc4747a4715634aa267a465ed218232e5a17c0df
&,t{tQ8ovUQ'
e67d979f50c5718bffc30ae266cf7853cf50d9fc77e7397c6645331badd3bf06
u"";wlVTfWNh
c8b22ee6b001b1510a9de42a39c5037168b39601ee8cf895f8eab701ebe35406
{',O%MnEX4qx
331398d9546ccaafb26d24da604c500ddff65b443918b9cb3503c37b267f7b43
fl%%"|A`"]6F
08c23bb85cf6f44bb0785680c1a6aa3547faa792b2f28b80501c5a8cde2734f8
:'}STmg'bOp<
cb28e65b6d38a6502124149c101efe6af76ff8c9daf139508ec70e8b1c6d2754
rWa}~aZ];>DG
4149620a292db7f2886b20b77d71a412c8a5e5b74ab322072059fb8e502a909d
MK';uZ7/^gjh
a57834a9ebb8c9a0447e9530f5701106a4f928bb178cc6be896e010b927edc49
$d}fMz+&Zmp2
acca42fd962495a17690760ed281b4d010058c2c820c9b3826843a772a1c3650
KRIh=drLUu:.
f9982b4088b3d6f170c1806e30dd7ee964e63d2c4dc4dfb9bc8ba34f3c41b622
U?+8zv"2WaV#
b40cebeade1a13de4925a2657b1731b94e52a45a39f9e34c06fd6823be2ccda3
4wV%b[\IwWfH
47a7ff273ea222a4a043465eb509b273b399b0e111e416f3caab646e2977ed13
dg8PFB(5/CGj
2986569eaffd9d2a5276b0024af2a1322450f385952ec22d2c459f1c43d8f67e
QZ*w\VB%)|@'
1d90b9cdb97154560f42e50b0356e69b4cac099569533aa188b7360f5bb85f41
3RXZYB8{B+J`
2dc2e7b5f29a91a41f850522f210877c9dc69c8d83918933cf16236026e064f8
?\pmxYQI-_dT
373607ea545fcc2d2dd00daf41fcb823021d279edbda4a8b177661637cdd621e
g(]6Is{')XEx
286688b8e7105738f2f2c077494cc070bbf2202ba8028daad508ece6b1b280c1
8OAfI!LRKR34
dcc5473291b802b4236a2d1bbfbaf5fa2ba7a354b34752b7137ac11d4aee7645
d8oWuUs[f3"&
0fba398f2484108a7e4e09da210fe758c325ecb66597b76b40402d97ba3e9db6
GC%W"R%^{V.n
56684075558613e5fb406f42ca5782591c5fc70b13224c3ceb669b5918605f29
ULh6LrO@-]X{
133b628feb75b8a44b4e3cb6534924aad62df4835821818a6089de2211fdcc6e
?~Guh>!S_1)p
b2dcde34f9569a3b9eb1aabdb36299355632b8f4bb77f0d6ac7219012a423251
vHXY#6|\SqlL
d48b14a1a9157e13dfa71cac3a65d0a60981c500a9ed1d75cbf72d2d85921f14
Gh9}(|y'P6aU
71755ce2d6bc7ef19f2fb3038572257ebc40f98255600a7ab788af8d14e8daa0
-C83Ian}|]=C
3f4289cc7bb11c70e6a6aace5814bdee0f94f189b29faa0f8653ced49c407f92
Hy'?rdH}!~Q7
f6a3cc9cde9c137577d079e39345bf646e09ac9db52bb6d895826819b4c21114
m-c2DQfEykL>
d4484a74f68bca0da5cc2b455a6d5afec2c3996f05db818f325664e871fcb265
g\B0RPdK^oL|
6498754317ac64e55d4249201f74913fb08ee884fc6ac8cd16eba4ac43d350fc
"?<,aIJ-,:"H
3f1578a9c6b76bcaf5c62c0086f9582ec4365aa3fb66c6dc2675bda4699fe735
O{kuN/C[qBr`
3b50f4562b161c3acde9cddaca1debe0ee6da95f45e37d74c6c0afed73081cf8
dL~$ImWF9'gi
9eb0db577936f0a2fb77847df5deb2a48e607dd89f961b69dc7c6df6bd90d3ce
PArS$kwjWWDT
dd89933f576e5798ce9c6c7cde9b265b4551eeade8c00a81ad7adcee947cc000
}ItG1c563D7!
2d733a77152ec01241e388780479d93e1c092ac4a805595fbbc9181b37a84ddd
.CBs=#>|&T6K
bda185e9fd527b141cb9a381d97d0a166c11d580df2a6401530d300f88811e49
tF1|?`N4AQJw
c7b788baa924590cfb65a2e8ef15c58e66746b087ae5ca08a751b293ca0e594b
!u%4cVIj[jq.
6c3fb7da84a55062bab05ffec0ff67cbb1436d4226a687adbc955b69b34e21cb
LTt7!z;kcSDR
f3f6fff82978637e9366ddc4c3784ba47dec4b693c3c6d4219ae85bb9eb18d2a
>%h\Ww|Oax~B
c1e2ea1b22f4e212860ed38884a8655ae84bfb59d93415eec884d8026bd58ac0
sUv5FAxB[IF8
0e34e9a70548b3cd9cd4d46fe7cde4b217736bae040f12196386af565d4f4f8e
tY"L5h7i@n+j
06549798772673043a72b7ad6042814219066be2b29b3b571d9c835a3446d2c5
=owHA;'~?h3"
d3eda05e00876a5a9039dd486e3e196d02383c18c4cbccb2923034015969323e
d\].z~b.tu],
0959a3220ff5cdcb99efeb54e9b5313a1b685070f2aa267092e373a6df03330d
LQx<cSl~:j#\
245bc1ebc18f8f45ac62a45c6df3aeafa389d51fc419bc6cdd838d7ba146f5f3
h`?xc/&Ka#<W
45f60d38d25e8484bcb85d37841950f9e86df20bcd0c9ab0b5f49b9b60d07a21
$OGOv4?#5.+Z
ab7d4d73947ca5149f4cb1f8f855c4b893154ad3d2c7a4b6e17727c0272ef963
3":/;RULd6ck
5c151fa015ab55771673f3568540380c0794246e2c5b8de5a4aba43b7a7d4cc8
vH9Pj&k6VlR%
e3b0abc118b303b5229249ae1ba0b2996f35d435cbb504df4dd7fe9a74cb0dd1
.Kx+qbav)}sf
d442357750c5650f07a49ee31c07fa97166f75fc01b0fe03cb284a445a1d3235
dE-K0=R/jkvX
6e92e95929fd17c44aadf8ec43a52f13491f30c61315a0b3094398c985443b56
E]})p_~sxae5
08dee0435c8bf65795a7f7f62105fdf5194312d6e43c3b7687ab2ad819af1b50
n4vzNu%q%_Q2
d4096313c3e5e1ab646b410a1a06694410c615f09a404248a953aedb62613e01
<`bT!)pZ7KNZ
265cafc5bfe093f6d03009e1feda17570fe8d3bd6ba198e7a658b11b441fc2e5
Ca:g~N56@^"\
5cd02d4cd4c984705c073b1c81762cb3a5e1b415ffe35111d41cc0a7ef45f9e1
eh8?LI+g@0Jj
463973646a044867a0891524cba9ff59aa601521dcde9f8371439aeec9aa768d
U;N^nkdi\=Gd
d1adb26f971fd6b62b64d93ccbb442f366a1be33c2438c94230028f54b6d1212
;:d]MxA54B8"
a4e0481bafb1abc28e1f70948454f539a55e622ce67e42a4278da9506fb96e5f
$PD'5eYY%`pP
fe58940a82ac799129bd21c6b9b1a6e9ef06e68d2dd0fc76497a4ee77623f329
E0?8dFfYCrge
596199f01c32f3f09cfa09bf1c400467aa1c05b7d53e7a989733ba56fc655968
{7LdXOkhU_KG
8c7e23872eef894facf7fb311780ebe90923abb7ce67299b8003c19e722e10ee
$UQe:g+u[Uqa
c019bdd8e902f55517b8c2755e6aaf610dfd76d369c7e6c81daef9dbedb8bea2
oxTZko]WW/Jl
9a9c8c140650eb893d1d264b7e63577cfbbe96d857a7930667d214af8066f4bc
xKSI/11E0X`2
2dba65008d24948f7d747435416d2a85bcd3f88ca818896414d9aed4f89193c4
c([/&V9\f)Hw
48e87a5faa7943a107db339603186ff8b4e22267a5ca876cba2658115d0e1081
-tQ<fFf%T/@&
73a6e5a4bebb0a25be26a8397090b99c6f0730d3a5d669f0cfcf5eb52a118b41
y0A6A1,F9[3[
aa1a6ef107044cb6c093362645801323da0fd72bf66abc36ccbe4fc350aa48ed
,e92i/|)8>wS
b609545c0d3eee3334e6bf16a5222df434c950bd6b618bb20c77e202830ce30f
:Ki\Y9dq,H).
66d05619f6863d066e6404d2f0c6ed62a6beff85519afbb37c375d4ff3bd9ffc
380dL*F]AR_/
81d73a9519871295832aceb0bb4248daa8d599c50e6cc0b7096410ebec2f9d07
rT2/|*^#m\)=
e10948bd1faa10b8497444c9063e403028758d89c53f13898a5cd91681e5111d
r>6=^x"Dad>v
d76e4e94dbfd9a988ad4d44262f397c5efb75e2e38cef8ed82ad2e6abb59b061
*NxZbaVJ|$nF
d99a1b6747e327e71f5b3dc4f0e2c506ac501fddb7de3a9f6ca9a2e36935c7f8
}Tr@!TW'w4C{
04426869b025338a7ebb147016e8e8cab0c1e005ed66adeb6c4517e157226309
61fL^F;=kgWL
65cbb422a065be1e59751e3ef227a8fdd42ea79b4bc2dcda607deed137490ddb
ZYAhhsL*Sbqm
9f78ac912708d12ef23161d098b5672181caa6eb0473148f47a39c7edb4062db
czmq>Q!>M8_z
c3daf895f9fba2115c3d3da8d473b048ee79c8bee5346ce2a5d9e8dbb529045b
dEPU?]s{oI:i
468d4b0fbae36418c2a96d0d997e836ad950abced4721f44ebdd0eb00c096468
K\1Czxgdh,ff
77b3c81c4f386d6e513b2cc36b2ece8102c16ba71df26b1adda7b792042cf964
DP,)!J<[;$#6
e00229cb6bebf8ffdcc70aada99a1a345124a460fff9bfb8bcbab55d343d07df
Cn-%wx~J\'uO
4949373c1539b7c923874bdae0a6684fec078297eb494bca41fc3c687b8891d2
"p:t(9:=O@Ha
65ae362457a1c42fd1ef79ebd114ac6b6d873d624d68e26c2733e4381b28511c
I1VM8R/L<`gV
3fb133ddd06e87477cc21960966db702fb723a24f0024acb2e50d3507fe081d7
[r0`-J~cGCRP
68747d0af6be445f9dfbd456ef23ac2c8307caa98393a06cb79652312b586af3
5>\"!O6O|1}}
a531e8d259b82cb8be564a9c6f8c5d721af2ad01139dba6b5dbe4b3db0679072
RV9j]1F+#i7_
f62b7e7522d36b49ba13765fdd62a6df22cbe89789196b42207aae527203a37d
8)g;>x0!dF0G
5d59177a5f8ca953f3fe981634a94242cb8ca44da2226f9d25081f51d7415011
5g`JV_lOKSDk
a4e9d8f3931205ff91c7aa43b8b5ba946fed2dcd5d77b20e75fe42a09746d0d6
CSzK\}B9IjjB
c370e80ccc600b61bc2ee4c0c02545753472992a02b3dea999ffe23d68f6070d
:8UmSIyP2L@m
5550114c8e3d83b625f135026eca5bd031ee37bd502ae88c9ba9a55b5d956292
J1Z&CLTra/}6
cc97484e9d2c5b3aca51a6026072c5723d6bf8e5b2418dc5ad19f7de5f51a698
PVBI*sa)s?C)
d4e18a786fb26f598707ff8bcb9995c48d2ffb52e0b8499d0bc80ab9e87b8b50
yW\%PX?w=B(D
09a4bd497b35e1bc3d28591c094ce2fb99880267e784eea1e49afd3706e3813d
FEK$.<1dso%v
7204cd7b8a8e801a55be006cba4b67875dc387d892dcbbcea2f938644fb9ecee
VG,+nUa[hAdS
4e06d3df7959ebd0580a308ac0b3c3922037c3a8c0a0eb13e30e7f5715f64302
mTQ1s|E8v)J"
44c736f410780bf39e2831216154e974c8efb5cf15926d9b4fa97482075d99f5
9q:0!fr0r@>9
242a93ec04be16d0abd842eb26e4c1efc6e94eeff093d1203b75defc8bc2c248

Dataset Card for Wordlists


Dataset Details

Dataset Description

This dataset consists of a collection of wordlists designed for use in cybersecurity tasks, such as penetration testing, vulnerability scanning, and password strength analysis. The wordlists cover various use cases, including common passwords, network device names, and terms used in security-related research. These wordlists are essential tools for security professionals in identifying weak points in systems, brute-forcing passwords, or scanning for vulnerabilities.

The data was compiled from publicly available resources such as vulnerability databases, security forums, and research papers on cybersecurity threats. The wordlists are structured in text files, with each word or term representing a potential attack vector, password, or system vulnerability.

  • Curated by: Canstralian
  • Language(s) (NLP): English
  • License: MIT License

Dataset Sources

Downloads last month
58

Collection including Chemically-motivated/wordlists