Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cqli-fi/passdoom-wordlist
It is a preliminary study aimed at making your brute-force practice comprehensive with expanded password types.
https://github.com/cqli-fi/passdoom-wordlist
bitcoin brute-force md5 sha1 sha256 wordlist
Last synced: 20 days ago
JSON representation
It is a preliminary study aimed at making your brute-force practice comprehensive with expanded password types.
- Host: GitHub
- URL: https://github.com/cqli-fi/passdoom-wordlist
- Owner: CqLi-Fi
- License: mit
- Created: 2024-09-29T13:23:09.000Z (about 2 months ago)
- Default Branch: main
- Last Pushed: 2024-10-17T21:25:07.000Z (about 1 month ago)
- Last Synced: 2024-10-30T10:09:19.410Z (20 days ago)
- Topics: bitcoin, brute-force, md5, sha1, sha256, wordlist
- Homepage:
- Size: 4.2 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Start
> The use of the available data and information is the sole responsibility of the users. All decisions about how and for what purpose this data will be used belong to the user.
> The use of the open source script to achieve results by brute force methods is the sole responsibility of the user. The user bears full responsibility for how and for what purpose this script is used.
# Usage Areas
Structurally, its use in these areas was tested and it was found that it needed to be improved for some targets.
```bash
✔️ Email systems (Gmail, Hotmail, Yandex)
✔️ Social media platforms (İnstagram, Twitter)
✔️ FTP servers
✔️ Wifi
🟠 Crypto wallets
🟡 PhpMyAdmin
✔️ MD5
✔️ SHA1
```# Passdoom
![Logo](https://gcdnb.pbrd.co/images/BMHc1dlzPVf4.png?o=1)
> The "wordlist" data within the project offers a comprehensive range of password combinations automatically generated using advanced encryption and security techniques. These combinations serve as a critical resource for identifying potential vulnerabilities, testing password strength, and conducting in-depth attack simulations. The wordlist data supports a robust password-cracking process, enabling users to enhance their security levels while proactively identifying and mitigating potential threats. Moreover, this data significantly demonstrates detection capabilities, revealing security weaknesses with high precision.
## Creating an Encryption Combination
#### Potential Password Combination
```bash
A = Animal Name / Everyday Item / Hobby
B = Work / Sport / Team / Special Day / Date
C = Important Person / Character / Celebrity
D = Numbers / Special Characters
N = Username (let's take Jessica as an example)
```| Salt | Format | Password |
| :-------- | :------- | :-------------------------- |
| `⚪ 1`|`N + B + D + C`|🔑 Jessica1992*Barca. |
| `⚪ 2`|`C + D + N + A + B`|🔑 Barca/JessicaCat1992 |
| `⚪ 3`|`N + A + B + C + D`|🔑 JessicaCat1992Barca. |
| `⚪ 4`|`D + N`|🔑 155664jessica |
| `⚪ 5`|`B + N + D`|🔑 1995Jessica* |#### Total Combination Calculation
This calculation reflects the amount of password combinations generated from a single “username” or “definition”.
```bash
1. (User Name Options)
2. (Animal/Hobby Options)
3. (Date/Event Options)
4. (Important Person / Celebrity Options)
5. (Special Character Options)X. Total Combinations = 100 × 30 × 30 × 30 × 50 × 20 × 10
Z. Total Combination = 3.000.000
```#### Bulk Diversification
A combination of infinite language options with limited options such as special characters, usernames, etc. leads to some pretty big results.```bash
X. Total Combinations = 100 × 30 × 30 × 30 × 50 × 20 × 10
Z. Total Combination = 3.000.000
P. Language Options = 500 Million
```#### Wordlist Paths
Use your preferred word list with the url structure without the need to download and get rid of the burden.```bash
Raw[EN] : Updating
Raw[TR] : raw.githubusercontent.com/CqLi-Fi/Passdoom-Wordlist/refs/heads/main/Wordlist/turkish.txt
Raw[FTP]: raw.githubusercontent.com/CqLi-Fi/Passdoom-Wordlist/refs/heads/main/Wordlist/ftp.txt
```