SecLists Passwords (Curated)
Scannednpx machina-cli add skill Eyadkelleh/awesome-claude-skills-security/passwords --openclawSecLists Passwords (Curated)
Description
Top password lists for authorized security testing: common passwords, darkweb leaks, worst passwords. Curated essentials (<10MB).
Source: SecLists/Passwords Repository: https://github.com/danielmiessler/SecLists License: MIT
When to Use This Skill
Use this skill when you need:
- Password spraying (authorized)
- Credential testing
- Password policy validation
- Brute force testing (authorized)
- Authentication testing
⚠️ IMPORTANT: Only use for authorized security testing, bug bounty programs, CTF competitions, or educational purposes.
Key Files in This Skill
500-worst-passwords.txt - 500 worst passwords10k-most-common.txt - 10K common passwords100k-most-used-passwords-NCSC.txt - 100K passwordsdarkweb2017_top-10000.txt - 10K from breachesprobable-v2_top-12000.txt - 12K probable passwords
Usage Example
# Access files from this skill
import os
# Example: Load patterns/payloads
skill_path = "references/Passwords"
# List all available files
for root, dirs, files in os.walk(skill_path):
for file in files:
if file.endswith('.txt'):
filepath = os.path.join(root, file)
print(f"Found: {filepath}")
# Read file content
with open(filepath, 'r', errors='ignore') as f:
content = f.read().splitlines()
print(f" Lines: {len(content)}")
Security & Ethics
Authorized Use Cases ✅
- Authorized penetration testing with written permission
- Bug bounty programs (within scope)
- CTF competitions
- Security research in controlled environments
- Testing your own systems
- Educational demonstrations
Prohibited Use Cases ❌
- Unauthorized access attempts
- Testing without permission
- Malicious activities
- Privacy violations
- Any illegal activities
Complete SecLists Collection
This is a curated subset of SecLists. For the complete collection:
- Full repository: https://github.com/danielmiessler/SecLists
- Size: 4.5 GB with 6,000+ files
- All categories: Passwords, Usernames, Discovery, Fuzzing, Payloads, Web-Shells, Pattern-Matching, AI, Miscellaneous
Generated by Skill Seeker | SecLists Passwords Collection License: MIT - Use responsibly with proper authorization
Source
git clone https://github.com/Eyadkelleh/awesome-claude-skills-security/blob/main/seclists-categories passwords/passwords/SKILL.mdView on GitHub Overview
This skill provides a focused, <10MB subset of SecLists passwords for authorized security testing. It includes common passwords, worst passwords, and breach-era lists, enabling efficient credential testing and policy validation without the full dataset.
How This Skill Works
The skill exposes a curated set of password lists (e.g., 500-worst-passwords.txt, 10k-most-common.txt, 100k-most-used-passwords-NCSC.txt, darkweb2017_top-10000.txt, probable-v2_top-12000.txt) that you load into your testing tooling. Researchers can script loading and iterating over lines to perform password spraying, brute force, or credential testing within an approved scope, while monitoring impact and maintaining ethics.
When to Use It
- Password spraying (authorized)
- Credential testing
- Password policy validation
- Brute force testing (authorized)
- Authentication testing
Quick Start
- Step 1: Locate the curated lists directory (references/Passwords) within the skill scope.
- Step 2: Pick a file (e.g., 10k-most-common.txt) and load its lines into your testing tool or script.
- Step 3: Run tests within authorized scope, apply rate limits, and analyze results with proper reporting.
Best Practices
- Obtain explicit authorization and clearly defined scope before testing.
- Start with the 10k-most-common and 500-worst-passwords lists to minimize risk before using larger datasets.
- Test only on non-production or consented environments; monitor impact and rollback if needed.
- Respect rate limits, throttle requests, and stagger IPs to avoid service disruption or triggering defenses.
- Document findings, securely handle any credentials encountered, and report within the agreed framework.
Example Use Cases
- A security team uses 10k-most-common.txt and 500-worst-passwords.txt to validate password policy in a staging environment.
- During a bug bounty engagement, testers run authorized password spraying against a defined asset set to confirm account lockout policies.
- A CTF challenge leverages darkweb2017_top-10000.txt to craft realistic test scenarios within rules.
- A credential stuffing test targets a client's web portal in a controlled, permissioned engagement to assess defenses.
- Researchers compare probable-v2_top-12000.txt against internal user hashes to gauge leakage risk in a controlled study.