
A collection of wordlists for security testing, penetration testing, and password analysis.
Note: For authorized testing only. Only use on systems you own or have permission to test.
# Clone the repository
git clone https://github.com/duyet/bruteforce-database.git
cd bruteforce-database
# Example: Test SSH login (authorized testing only!)
hydra -L usernames.txt -P 1000000-password-seclists.txt ssh://target.example.com
# Example: Web directory brute-forcing
gobuster dir -u https://example.com -w forced-browsing/all.txt
# Example: Subdomain enumeration
ffuf -u https://FUZZ.example.com -w subdomains-10000.txt
| I need to… | Use this wordlist | Why? |
|---|---|---|
| Test common passwords | 1000000-password-seclists.txt |
Most common passwords from breach data |
| Test password policy | 8-more-passwords.txt |
Filtered for length, complexity requirements |
| Enumerate user accounts | usernames.txt |
400K+ common US usernames |
| Find hidden directories | forced-browsing/all.txt |
Comprehensive web path discovery |
| Discover subdomains | subdomains-10000.txt |
10K most common subdomain names |
| Test against massive dataset | 2151220-passwords.txt |
2.1M password compilation |
| Generate wordlist for JtR | uniqpass_v16_password.txt |
Optimized for John the Ripper |
| Test keyboard patterns | cain.txt |
Includes common patterns from Cain & Abel |
1000000-password-seclists.txt (1M entries, 8.5 MB)
2151220-passwords.txt (2.1M entries, 20 MB)
8-more-passwords.txt (62K entries, 629 KB)
7-more-passwords.txt (528K entries, 5 MB)
cain.txt (307K entries, 2.5 MB)
bitcoin-brainwallet.lst (395K entries, 3.4 MB)
38650-password-sktorrent.txt (39K entries, 309 KB)
uniqpass_v16_password.txt (2.1M entries, 20 MB)
usernames.txt (403K entries, 3.3 MB)
38650-username-sktorrent.txt (39K entries, 258 KB)
facebook-firstnames.txt (4.3M entries, 37 MB)
us-cities.txt (21K entries, 199 KB)
indo-cities.txt (102 entries, 1.2 KB)
subdomains-10000.txt (10K entries, 97 KB)
forced-browsing/ directory contains specialized wordlists for web application testing:
all.txt (43K entries) - Comprehensive file/directory listall-extensionless.txt (25K entries) - Paths without file extensionsall-dirs.txt - Directory names onlyforced-browsing/cat/ - Organized by file category:
Conf/ - Configuration files (.conf, .config, .htaccess, .properties)Database/ - Database files (.sql, .mdb, .xml, .ini)Language/ - Source code files (.php, .asp, .jsp, .java)Project/ - Project files (.csproj, .pdb, .sln)forced-browsing/context/ - Organized by context:
admin.txt - Admin panels and interfacestest.txt - Test environments and filesdebug.txt - Debug endpointserror.txt - Error pages and handlershelp.txt - Help and documentation pathsUsage Example:
# Scan for admin panels
gobuster dir -u https://target.com -w forced-browsing/context/admin.txt
# Look for config files
ffuf -u https://target.com/FUZZ -w forced-browsing/cat/Conf/conf.txt
# Comprehensive directory scan
dirsearch -u https://target.com -w forced-browsing/all.txt
# John the Ripper
john --wordlist=2151220-passwords.txt hashes.txt
# Hashcat (MD5)
hashcat -m 0 -a 0 hashes.txt 1000000-password-seclists.txt
# Hydra (SSH brute force)
hydra -l admin -P 8-more-passwords.txt ssh://192.168.1.100
# Directory discovery with gobuster
gobuster dir -u https://example.com -w forced-browsing/all.txt -t 50
# File discovery with specific extensions
gobuster dir -u https://example.com -w forced-browsing/all-extensionless.txt -x php,html,txt
# Fast fuzzing with ffuf
ffuf -u https://example.com/FUZZ -w forced-browsing/context/admin.txt -mc 200,301,302
# Sublist3r
sublist3r -d example.com -w subdomains-10000.txt
# ffuf for subdomain fuzzing
ffuf -u https://FUZZ.example.com -w subdomains-10000.txt -mc 200
# gobuster DNS mode
gobuster dns -d example.com -w subdomains-10000.txt
# Test for valid usernames (authorized only!)
./enum4linux -U target.com -w usernames.txt
# Check username availability
curl https://api.example.com/check-username -d "username=FUZZ" -w usernames.txt
Quick test (< 1 minute):
8-more-passwords.txt (62K entries)Standard test (5-10 minutes):
1000000-password-seclists.txt (1M entries)Comprehensive test (30+ minutes):
2151220-passwords.txt (2.1M entries)Policy-specific testing:
8-more-passwords.txt7-more-passwords.txt1000000-password-seclists.txtQuick scan:
forced-browsing/context/<specific>.txt (targeted)Standard scan:
forced-browsing/all-dirs.txt (directories only)Comprehensive scan:
forced-browsing/all.txt (everything)File-specific:
forced-browsing/cat/<type>/ (by file extension)This repository includes automation tools:
# Validate all wordlists
python3 scripts/validate.py
# Validate specific file
python3 scripts/validate.py --file passwords.txt
# Deduplicate wordlists
python3 scripts/deduplicate.py passwords.txt
# Deduplicate all
python3 scripts/deduplicate.py --all
Every commit and pull request is automatically:
See .github/workflows/validate.yml
The manifest.json file contains metadata for every wordlist:
Generated automatically on every commit.
We welcome contributions! See CONTRIBUTING.md for detailed guidelines.
# Before submitting PR
python3 scripts/validate.py
python3 scripts/deduplicate.py --all
IMPORTANT: These wordlists are for authorized security testing only.
By using these wordlists, you agree to use them responsibly and legally.
See CLAUDE.md for our full philosophy on ethical use.
Read CLAUDE.md for our principles:
Thank you to everyone who has contributed to this project:
Want to contribute? See CONTRIBUTING.md!
This project is licensed under the MIT License.
You are free to:
Requirements:
If you find this project useful:
See CHANGELOG.md for version history and updates.
“Quality is not an act, it’s a habit.” - Aristotle
Made with ❤️ by the security community, for the security community.