passwords
Imported from https://github.com/Eyadkelleh/awesome-claude-skills-security.
Packaged view
This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.
Install command
npx @skill-hub/cli install eyadkelleh-awesome-claude-skills-security-passwords
Repository
Skill path: seclists-categories passwords/passwords
Imported from https://github.com/Eyadkelleh/awesome-claude-skills-security.
Open repositoryBest for
Primary workflow: Run DevOps.
Technical facets: Full Stack, Security.
Target audience: everyone.
License: Unknown.
Original source
Catalog source: SkillHub Club.
Repository owner: Eyadkelleh.
This is still a mirrored public skill entry. Review the repository before installing into production workflows.
What it helps with
- Install passwords into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
- Review https://github.com/Eyadkelleh/awesome-claude-skills-security before adding passwords to shared team environments
- Use passwords for development workflows
Works across
Favorites: 0.
Sub-skills: 0.
Aggregator: No.
Original source / Raw SKILL.md
---
name: SecLists Passwords (Curated)
description: Top password lists for authorized security testing: common passwords, darkweb leaks, worst passwords. Curated essentials (<10MB).
---
# SecLists Passwords (Curated)
## Description
Top password lists for authorized security testing: common passwords, darkweb leaks, worst passwords. Curated essentials (<10MB).
**Source:** [SecLists/Passwords](https://github.com/danielmiessler/SecLists/tree/master/Passwords)
**Repository:** https://github.com/danielmiessler/SecLists
**License:** MIT
## When to Use This Skill
Use this skill when you need:
- Password spraying (authorized)
- Credential testing
- Password policy validation
- Brute force testing (authorized)
- Authentication testing
**⚠️ IMPORTANT:** Only use for authorized security testing, bug bounty programs, CTF competitions, or educational purposes.
## Key Files in This Skill
- `500-worst-passwords.txt - 500 worst passwords`
- `10k-most-common.txt - 10K common passwords`
- `100k-most-used-passwords-NCSC.txt - 100K passwords`
- `darkweb2017_top-10000.txt - 10K from breaches`
- `probable-v2_top-12000.txt - 12K probable passwords`
## Usage Example
```python
# Access files from this skill
import os
# Example: Load patterns/payloads
skill_path = "references/Passwords"
# List all available files
for root, dirs, files in os.walk(skill_path):
for file in files:
if file.endswith('.txt'):
filepath = os.path.join(root, file)
print(f"Found: {filepath}")
# Read file content
with open(filepath, 'r', errors='ignore') as f:
content = f.read().splitlines()
print(f" Lines: {len(content)}")
```
## Security & Ethics
### Authorized Use Cases ✅
- Authorized penetration testing with written permission
- Bug bounty programs (within scope)
- CTF competitions
- Security research in controlled environments
- Testing your own systems
- Educational demonstrations
### Prohibited Use Cases ❌
- Unauthorized access attempts
- Testing without permission
- Malicious activities
- Privacy violations
- Any illegal activities
## Complete SecLists Collection
This is a curated subset of SecLists. For the complete collection:
- **Full repository:** https://github.com/danielmiessler/SecLists
- **Size:** 4.5 GB with 6,000+ files
- **All categories:** Passwords, Usernames, Discovery, Fuzzing, Payloads, Web-Shells, Pattern-Matching, AI, Miscellaneous
---
**Generated by Skill Seeker** | SecLists Passwords Collection
**License:** MIT - Use responsibly with proper authorization