GithubHelp home page GithubHelp logo

pretocc / probable-wordlists Goto Github PK

View Code? Open in Web Editor NEW

This project forked from berzerk0/probable-wordlists

0.0 1.0 0.0 52.86 MB

Wordlists sorted by probability originally created for password generation and testing

License: Creative Commons Attribution Share Alike 4.0 International

probable-wordlists's Introduction

To Potential Cloners and Master-Zip Downloaders - Rev 1.1 is here! Easy to clone!

Instead of hundreds of smaller files, there are handful Mega.nz links to the Wordlists. Torrents in 1.2. The repository is no longer more than 20GB! The file contents are now less than 70MB, but there are old versions that make it still large. Working on that presently.

Probable Wordlists Logo

Probable Wordlists

Wordlists sorted by popularity originally created for password generation and testing

Why slog through an encyclopedic, alphabetized wordlist when you can start with the words people are most likely to use?

Methodology - The Why and How

While I was able to locate a few Password Wordlists that were sorted by popularity, the vast majority of lists, especially the larger lists, were sorted alphabetically. This seems like a major practicality flaw! If we assume that the most common password is "password," and we are performing a dictionary attack using an English dictionary, we are going to have to slog from "aardvark" through "passover" to get to "password." Now I don't know off the top of my head just how common "aardvark" is as a password - but we could be wasting a lot of time by not starting with the most common password on our list!

I went to SecLists, Weakpass, and Hashes.org and downloaded nearly every single Wordlist containing real passwords I could find. These lists were huge, and I ended up with over 80 GB actual, human-generated and used passwords. These were split up among over 350 files of varying length, sorting scheme, character encoding, origin and other properties. I sorted these files, removed duplicates from within the files themselves, and prepared to join them all together.

Some of these lists were composed of the other lists, and some were exact duplicates. I took care to remove any exact duplicate files - we didn't need to have any avoidable false positives. If a password was found across multiple files, I considered this to be an approximation of its popularity. If an entry was found in 5 files, it wasn't too popular. If an entry could be found in 300 files, it was very popular. Using Unix commands, I concatenated all the files into one giant file representing keys to over 4 billion secret areas on the web, and sorted them by number of appearances in the single file. From this, I was able to create a large wordlist sorted by popularity, not the alphabet.

Laser-Guided Wordlist Generator in the works as well - stay tuned

Real-Passwords

These are REAL passwords. Every once in a while, a popular site has a high-profile security leak and passwords are released freely across the internet. Some of these passwords can be found on aggregator sites where they are separated from usernames to protect the unfortunate victim.

The files in this folder come from https://github.com/danielmiessler/SecLists, https://weakpass.com/ and https://hashes.org/

NOTE THAT UNTIL REV 2.0, ALL NON-ASCII CHARACTERS HAVE BEEN REMOVED

  • A more inclusive, and thus, more accurate list is in the works.

NOTE THAT THE DUE TO THE NEWLINE DUPLICATES ISSUE, 'WPA-Length' LISTS MAY INCLUDE LINES OF 7 CHARACTERS

  • This will be fixed in Rev 2.0

Lists sorted by popularity will include "probable" in the filename

Dictionary-Style Lists

Wordlists including dictionaries, encyclopedic lists and miscellaneous.

Tasklist and Plans

Rev 1.1 Task List

  • Explain methodology
  • Make Quick-fix for duplicates caused by newline and blankspace characters (not a full fix, more of a temporary patch)
  • Compress the Files(LZMA-Zip, tar.gz, tar.xz)
  • Removed huge files making the repo hard to clone.

Rev 1.2 Task List

  • Re-include Largest Wordlists in Repo (passwords appearing at least twice)
  • Create and Add Torrents

Rev 2.0 Plan

  • Include truly acccurate WPA-Length sorting
  • More sources (Contributions open, with strict terms. See Contributions page)
  • Bigger sources
  • Non-ASCII Sources
  • Specialized lists compiled from sources themselves
  • Totally Recompile wordlists for improved accuracy, no duplicates from the get-go.

Undetermined Future Plans

  • Come up with poetic name for 'things that'd be cool that I'm not sure when I'll do'
  • Create list of "pure" common passwords for use with rule-based cracking

Attributions

Disclaimer and License

  • These lists are for LAWFUL, ETHICAL AND EDUCATIONAL PURPOSES ONLY.
  • The files contained in this repository are released "as is" without warranty, support, or guarantee of effectiveness.
  • However, I am open to hearing about any issues found within these files and will be actively maintaining this repository for the foreseeable future. If you find anything noteworthy, let me know and I'll see what I can do about it.

I did not steal, phish, deceive or hack in any way to get hold of these passwords. All lines in these files were obtained through freely available means.

License: CC BY-SA 4.0

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

You are free to:

Share

  • Copy and redistribute the material in any medium or format

Adapt

  • Remix, transform, and build upon the materialfor any purpose, even commercially.

The licensor cannot revoke these freedoms as long as you follow the license terms.

Under the following terms:

Attribution

  • You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.

ShareAlike

  • If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.

No additional restrictions

  • You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.

Notices:

  • You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
  • No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.

Enjoy!

probable-wordlists's People

Contributors

berzerk0 avatar

Watchers

Santiago Prego avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.