https://github.com/phrutis/passwords
Huge password database for sale $600
https://github.com/phrutis/passwords
brute crypto dict dictionary leak leaks list logs pass passwords private
Last synced: 4 months ago
JSON representation
Huge password database for sale $600
- Host: GitHub
- URL: https://github.com/phrutis/passwords
- Owner: phrutis
- Created: 2025-02-23T08:03:39.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2025-06-01T08:06:58.000Z (4 months ago)
- Last Synced: 2025-06-05T16:06:41.545Z (4 months ago)
- Topics: brute, crypto, dict, dictionary, leak, leaks, list, logs, pass, passwords, private
- Homepage: https://t.me/cuda8
- Size: 11.7 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Passwords for Brute $500
| Password length | Number of passwords | Size dic |
|------------|----------|----------|
| passwords_8.txt | 1,613,061,095 | 14.17 GB |
| passwords_9.txt | 1,946,725,602 | 19.01 GB |
| passwords_10.txt | 1,687,085,510 | 18.12 GB |
| passwords_11.txt | 1,814,346,191 | 21.26 GB |
| passwords_12.txt | 1,589,555,575 | 20.17 GB |
| passwords_13.txt | 1,254,021,028 | 17.14 GB |
| passwords_14.txt | 981,730,250 | 14.38 GB |
| passwords_15.txt | 804,364,044 | 12.56 GB |
| passwords_16.txt | 459,936,517 | 7.64 GB |
| passwords_17-30.txt | 832,763,112 | 16.42 GB |
| BONUS.txt | 197,405,768 | 2.45 GB |Total: 12,150,687,090 passwords (no duplicates and garbage) 167 GB Unpack
Removed all passwords consisting only of numbers in 8,9,10 long
BONUS.txt - best crypto passwords (long 8-45)Passwords collected over 3 years consist of:
GoldPack Database ~20TB, Logs ~50TB, priv tg ~25TB, leaks ~30TB, forum with premium access ~40TB.
Password lists were purchased from individuals.
Passwords were extracted from all tg channels that deal with logs, both private and free + antipublic.
From all databases, m:p, sql tables, u:l:p, u:p, l:p and other sources.This is the best password database for brute force.
The database finds passwords for various hashes in the paid password selection service [hashes.com](https://hashes.com/en/escrow/view)
Having found several passwords, you can recoup the costs of purchasing this database.Download password database https://t.me/cuda8