Brute Force list | Password Username Wordlist
Default Credentials:-
Links:
- https://www.cirt.net/passwords
- http://www.passwordsdatabase.com/
- https://many-passwords.github.io/
- https://github.com/ihebski/DefaultCreds-cheat-sheet
- http://www.vulnerabilityassessment.co.uk/passwordsC.htm
- https://192-168-1-1ip.mobi/default-router-passwords-list/
- https://github.com/danielmiessler/SecLists/blob/master/Passwords/Default-Credentials/default-passwords.csv
- https://github.com/danielmiessler/SecLists
- https://github.com/carlospolop/hacktricks/tree/95b16dc7eb952272459fc877e4c9d0777d746a16/google/fuzzing/tree/master/dictionaries/README.md
- https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
- https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
Crunch:-
- crunch 4 6 0123456789ABCDEF -o crunch1.txt #From length 4 to 6 using that alphabet
- crunch 4 4 -f /usr/share/crunch/charset.lst mixalpha # Only length 4 using charset mixalpha (inside file charset.lst)
- @ Lower case alpha characters
- ,Upper case alpha characters
- % Numeric characters
- ^ Special characters including spac
- crunch 6 8 -t ,@@^^%%
• cewl example.com -m 5 -w words.txt
Online cracking databases:-
- https://www.onlinehashcrack.com/ (Hashes, WPA2 captures, and archives MSOffice, ZIP, PDF...)
- https://crackstation.net/ (Hashes)
- https://md5decrypt.net/ (MD5)
- https://gpuhash.me/ (Hashes and file hashes)
- https://hashes.org/search.php (Hashes)
- https://www.cmd5.org/ (Hashes)
- https://hashkiller.co.uk/Cracker (MD5, NTLM, SHA1, MySQL5, SHA256, SHA512)
- https://www.md5online.org/md5-decrypt.html (MD5)
- http://reverse-hash-lookup.online-domain-tools.com/
Comments
Post a Comment