Hacking login accounts / credentials
credential lists
- Collection #1
- SecLists – collection of multiple types of lists used during security assessments including usernames, passwords, URLs, sensitive data patterns, fuzzing payloads and web shells
Software
- Hashcat
- John the Ripper