Name | DL | Torrents | Total Size | Security [edit] | 10 | 645.31GB | 97 | 0 | Grymma Dataset [edit] | 3 | 698.46GB | 16 | 0 | The Cybersecurity Academic's Seedbox [edit] | 24 | 1.29TB | 137 | 0 |
crackstation.txt.gz | 4.50GB |
Type: Dataset
Tags:
Bibtex:
Tags:
Bibtex:
@article{, title= {CrackStation's Password Cracking Dictionary}, journal= {}, author= {Defuse Security}, year= {2010}, url= {https://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm}, license= {Creative Commons Attribution-ShareAlike 3.0}, abstract= {The list contains every wordlist, dictionary, and password database leak that I could find on the internet (and I spent a LOT of time looking). It also contains every word in the Wikipedia databases (pages-articles, retrieved 2010, all languages) as well as lots of books from Project Gutenberg. It also includes the passwords from some low-profile database breaches that were being sold in the underground years ago. The format of the list is a standard text file sorted in non-case-sensitive alphabetical order. Lines are separated with a newline "\n" character. You can test the list without downloading it by giving SHA256 hashes to the free hash cracker or to @PlzCrack on twitter. Here's a tool for computing hashes easily. Here are the results of cracking LinkedIn's and eHarmony's password hash leaks with the list. The list is responsible for cracking about 30% of all hashes given to CrackStation's free hash cracker, but that figure should be taken with a grain of salt because some people try hashes of really weak passwords just to test the service, and others try to crack their hashes with other online hash crackers before finding CrackStation. Using the list, we were able to crack 49.98% of one customer's set of 373,000 human password hashes to motivate their move to a better salting scheme.}, keywords= {}, terms= {} }