Word lists for brute-force
wordlistctl: large database of dictionaries [Dictionary Collection]
wordlistctl is a program that contains a large database of dictionaries. In fact, it is this database that is of interest, dictionaries can be downloaded directly, without this program – I will give links to the databases below, they are in JSON format, that is, quite readable.
wordlistctl is created by blackarch.org developers, web site: https://github.com/BlackArch/wordlistctl
How to install wordlistctl
Installing wordlistctl on Kali Linux:
sudo apt install python3-pip python3-libtorrent python3-coloredlogs git clone https://github.com/BlackArch/wordlistctl cd wordlistctl
Open the requirements.txt file
And remove the line from there
sudo pip3 install -r requirements.txt python3 ./wordlistctl.py
In BlackArch, this program is in the standard repository – install directly from there.
sudo pacman -S wordlistctl
How to use wordlistctl
All dictionaries are divided into 5 categories:
- misc = other
To show all dictionaries, for example, in the password category:
wordlistctl -F password
With the -S option, you can search by dictionary names, for example, search for ‘rus’:
wordlistctl -S rus --==[ wordlistctl by blackarch.org ]==-- [*] searching for rus in urls.json [+] wordlist russian_users found: id=842 [+] wordlist rus_surnames_date099_fin found: id=1022 [+] wordlist rus_surnames_first_letter found: id=1046 [+] wordlist rus_surnames_fin found: id=1094 [+] wordlist rus_surnames_date19002020_fin found: id=1104 [+] wordlist rus_names_date099_fin found: id=1163 [+] wordlist rus_names_translit found: id=1185 [+] wordlist rus_cities_translit found: id=1206 [+] wordlist rus_names_date19002020_fin found: id=1209 [+] wordlist rus_eng found: id=1245 [+] wordlist rus_names_fin found: id=1278 [+] wordlist rus_mat found: id=1316 [+] wordlist rus_latin found: id=1323 [+] wordlist rus_names_kb_chage found: id=1324 [+] wordlist rus_cities_kbchange found: id=1401 [+] wordlist rus-mini found: id=1705 [+] wordlist russian found: id=1710 [+] wordlist russian2 found: id=1711 [+] wordlist russian_31799 found: id=1712 [+] wordlist russian_name found: id=1713 [+] wordlist russkie-maty found: id=1714 [+] wordlist rus_months_en found: id=1768 [+] wordlist rus_months_translit found: id=1769
To download dictionaries, create a wordlists folder in the current directory:
And download to this folder (-d wordlists) a dictionary that has the identifier 1714 (-f 1714), unpack it and delete the original archive (-Xr):
wordlistctl -f 1714 -d wordlists -Xr
Brute-force word list collection for Kali Linux [Dictionary Collection]
Kali.Tools has a page that does not contain dictionaries from various sources and with different purposes.
You will find some of these dictionaries right in your Kali Linux system. For the rest are given links to download.
A page with brute force dictionaries and their description: https://kali.tools/?p=1896
Collection of dictionaries from the WirelessHack.org site [Dictionaries for hacking Wi-Fi]
The WirelessHack.org site collected dictionaries that have been hanging around for some time here and there.
Description page: https://www.wirelesshack.org/wpa-wpa2-word-list-dictionaries.html
- BIG-WPA-LIST-1 (size 247MB)
- BIG-WPA-LIST-2 (size 307MB)
- BIG-WPA-LIST-3 (size 277MB)
- Darkc0de.lst (size 17.4MB) - this was the default dictionary in Backtrack 5
- Rockyou.txt (size 133MB) - default dictionary in Kali Linux
- Names (size 3.7MB) - names and variants of names
Besides them, there are still quite a few dictionaries, for a total of 8.5 GB. If you use dictionaries infrequently, it is recommended to compress them for save storage space – they are plain text files that may be compressed very well – after archiving they will take about 10 times less space.
Last Updated on
- How to install all Patator dependencies (100%)
- Hashcat manual: how to use the program for cracking passwords (100%)
- How to continue brute-force from the hashcat restore point (hashcat sessions) (100%)
- How to use Hashcat to crack passwords containing non-Latin characters (100%)
- Hacking WPA/WPA2 passwords with Aircrack-ng: dictionary attack, cooperation with Hashcat, maskprocessor, statsprocessor, John the Ripper, Crunch, hacking in Windows (80.5%)
- Cracking WPA / WPA2 handshakes using GPU on Windows (RANDOM - 50%)