pax_global_header 0000666 0000000 0000000 00000000064 13651223234 0014513 g ustar 00root root 0000000 0000000 52 comment=b153a43cda5001340dd987c089ed5b6a10f19282
brutespray-1.6.8/ 0000775 0000000 0000000 00000000000 13651223234 0013727 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/CHANGELOG.md 0000664 0000000 0000000 00000002103 13651223234 0015534 0 ustar 00root root 0000000 0000000 # Changelog
* v1.6.8
* added option to supress large banner
* v1.6.7
* Check for wordlist in local directory
* v1.6.6
* Integrated JSON support thanks to c-f
* v1.6.5
* updated for python3 compatibility
* switched to ElementTree XML API
* rewrote xml parsing and fixed bugs
* updated wordlists
* v1.6.4
* use dictionary for name conversion
* v1.6.3
* changes default smtp values
* v1.6.2
* added file and path error checking
* smtp auth args added
* enabled piping medusa errors out
* v1.6.1
* added output folder location verbage
* -m dumps modules available
* error checking when loading file
* v1.6.0
* added support for SNMP
* v1.5.3
* adjustments to wordlists
* v1.5.2
* change tmp and output directory behavior
* v1.5.1
* added check for no services
* v1.5
* added interactive mode
* v1.4
* added ability to use nmap XML
* v1.3
* added the ability to stop on success
* added the ability to reference custom userlists and passlists
* added the ability to specify specific users & passwords
brutespray-1.6.8/LICENSE.md 0000664 0000000 0000000 00000002060 13651223234 0015331 0 ustar 00root root 0000000 0000000 MIT License
Copyright (c) [2017] [Shane Young]
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
brutespray-1.6.8/README.md 0000664 0000000 0000000 00000004312 13651223234 0015206 0 ustar 00root root 0000000 0000000 # BruteSpray
Created by: Shane Young/@x90skysn3k && Jacob Robles/@shellfail
Inspired by: Leon Johnson/@sho-luv
Credit to Medusa: JoMo-Kun / Foofus Networks - http://www.foofus.net
#### Version - 1.6.8
# Demo
https://youtu.be/C-CVLbSEe_g
# Description
BruteSpray takes nmap GNMAP/XML output or newline seperated JSONS and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap.
# Installation
```pip install -r requirements.txt```
On Kali:
```apt-get install brutespray```
# Usage
First do an nmap scan with ```-oG nmap.gnmap``` or ```-oX nmap.xml```.
Command: ```python brutespray.py -h```
Command: ```python brutespray.py --file nmap.gnmap```
Command: ```python brutesrpay.py --file nmap.xml```
Command: ```python brutespray.py --file nmap.xml -i```
## Examples
#### Using Custom Wordlists:
```python brutespray.py --file nmap.gnmap -U /usr/share/wordlist/user.txt -P /usr/share/wordlist/pass.txt --threads 5 --hosts 5```
#### Brute-Forcing Specific Services:
```python brutespray.py --file nmap.gnmap --service ftp,ssh,telnet --threads 5 --hosts 5```
#### Specific Credentials:
```python brutespray.py --file nmap.gnmap -u admin -p password --threads 5 --hosts 5```
#### Continue After Success:
```python brutespray.py --file nmap.gnmap --threads 5 --hosts 5 -c```
#### Use Nmap XML Output
```python brutespray.py --file nmap.xml --threads 5 --hosts 5```
#### Use JSON Output
```python brutespray.py --file out.json --threads 5 --hosts 5```
#### Interactive Mode
```python brutespray.py --file nmap.xml -i```
# Supported Services
* ssh
* ftp
* telnet
* vnc
* mssql
* mysql
* postgresql
* rsh
* imap
* nntp
* pcanywhere
* pop3
* rexec
* rlogin
* smbnt
* smtp
* svn
* vmauthd
* snmp
# Data Specs
```json
{"host":"127.0.0.1","port":"3306","service":"mysql"}
{"host":"127.0.0.10","port":"3306","service":"mysql"}
...
```
# Changelog
Changelog notes are available at [CHANGELOG.md](https://github.com/x90skysn3k/brutespray/blob/master/CHANGELOG.md)
brutespray-1.6.8/brutespray.py 0000775 0000000 0000000 00000045145 13651223234 0016515 0 ustar 00root root 0000000 0000000 #! /usr/bin/python3
# -*- coding: utf-8 -*-
from argparse import RawTextHelpFormatter
import readline, glob
import sys, time, os
import subprocess
import xml.etree.ElementTree as ET
import re
import argparse
import threading
import itertools
import tempfile
import shutil
import json
from multiprocessing import Process
services = {}
loading = False
class colors:
white = "\033[1;37m"
normal = "\033[0;00m"
red = "\033[1;31m"
blue = "\033[1;34m"
green = "\033[1;32m"
lightblue = "\033[0;34m"
banner = colors.red + r"""
#@ @/
@@@ @@@
%@@@ @@@.
@@@@@ @@@@%
@@@@@ @@@@@
@@@@@@@ @ @@@@@@@
@(@@@@@@@% @@@@@@@ &@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@*@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@
@@@( @@@@@#@@@@@@@@@*@@@,@@@@@@@@@@@@@@@ @@@
@@@@@@ .@@@/@@@@@@@@@@@@@/@@@@ @@@@@@
@@@ @@@@@@@@@@@ @@@
@@@@* ,@@@@@@@@@( ,@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@
@@@.@@@@@@@@@@@@@@@ @@@
@@@@@@ @@@@@ @@@@@@
@@@@@@@@@@@@@
@@ @@@ @@
@@ @@@@@@@ @@
@@% @ @@
"""+'\n' \
+ r"""
██████╗ ██████╗ ██╗ ██╗████████╗███████╗███████╗██████╗ ██████╗ █████╗ ██╗ ██╗
██╔══██╗██╔══██╗██║ ██║╚══██╔══╝██╔════╝██╔════╝██╔══██╗██╔══██╗██╔══██╗╚██╗ ██╔╝
██████╔╝██████╔╝██║ ██║ ██║ █████╗ ███████╗██████╔╝██████╔╝███████║ ╚████╔╝
██╔══██╗██╔══██╗██║ ██║ ██║ ██╔══╝ ╚════██║██╔═══╝ ██╔══██╗██╔══██║ ╚██╔╝
██████╔╝██║ ██║╚██████╔╝ ██║ ███████╗███████║██║ ██║ ██║██║ ██║ ██║
╚═════╝ ╚═╝ ╚═╝ ╚═════╝ ╚═╝ ╚══════╝╚══════╝╚═╝ ╚═╝ ╚═╝╚═╝ ╚═╝ ╚═╝
"""+'\n' \
+ '\n brutespray.py v1.6.8' \
+ '\n Created by: Shane Young/@x90skysn3k && Jacob Robles/@shellfail' \
+ '\n Inspired by: Leon Johnson/@sho-luv' \
+ '\n Credit to Medusa: JoMo-Kun / Foofus Networks \n' + colors.normal
#ascii art by: Cara Pearson
quiet_banner = colors.red + '~ BruteSpray ~' + colors.normal
class tabCompleter(object):
def pathCompleter(self,text,state):
line = readline.get_line_buffer().split()
return [x for x in glob.glob(text+'*')][state]
def interactive():
t = tabCompleter()
singluser = ""
if args.interactive is True:
print(colors.white + "\n\nWelcome to interactive mode!\n\n" + colors.normal)
print(colors.red + "WARNING:" + colors.white + " Leaving an option blank will leave it empty and refer to default\n\n" + colors.normal)
print("Available services to brute-force:")
for serv in services:
srv = serv
for prt in services[serv]:
iplist = services[serv][prt]
port = prt
plist = len(iplist)
print("Service: " + colors.green + str(serv) + colors.normal + " on port " + colors.red + str(port) + colors.normal + " with " + colors.red + str(plist) + colors.normal + " hosts")
args.service = input('\n' + colors.lightblue + 'Enter services you want to brute - default all (ssh,ftp,etc): ' + colors.red)
args.threads = input(colors.lightblue + 'Enter the number of parallel threads (default is 2): ' + colors.red)
args.hosts = input(colors.lightblue + 'Enter the number of parallel hosts to scan per service (default is 1): ' + colors.red)
if args.passlist is None or args.userlist is None:
customword = input(colors.lightblue + 'Would you like to specify a wordlist? (y/n): ' + colors.red)
if customword == "y":
readline.set_completer_delims('\t')
readline.parse_and_bind("tab: complete")
readline.set_completer(t.pathCompleter)
if args.userlist is None and args.username is None:
args.userlist = input(colors.lightblue + 'Enter a userlist you would like to use: ' + colors.red)
if args.userlist == "":
args.userlist = None
if args.passlist is None and args.password is None:
args.passlist = input(colors.lightblue + 'Enter a passlist you would like to use: ' + colors.red)
if args.passlist == "":
args.passlist = None
if args.username is None or args.password is None:
singluser = input(colors.lightblue + 'Would to specify a single username or password (y/n): ' + colors.red)
if singluser == "y":
if args.username is None and args.userlist is None:
args.username = input(colors.lightblue + 'Enter a username: ' + colors.red)
if args.username == "":
args.username = None
if args.password is None and args.passlist is None:
args.password = input(colors.lightblue + 'Enter a password: ' + colors.red)
if args.password == "":
args.password = None
if args.service == "":
args.service = "all"
if args.threads == "":
args.threads = "2"
if args.hosts == "":
args.hosts = "1"
print(colors.normal)
NAME_MAP = {"ms-sql-s": "mssql",
"microsoft-ds": "smbnt",
"pcanywheredata": "pcanywhere",
"postgresql": "postgres",
"shell": "rsh",
"exec": "rexec",
"login": "rlogin",
"smtps": "smtp",
"submission": "smtp",
"imaps": "imap",
"pop3s": "pop3",
"iss-realsecure": "vmauthd",
"snmptrap": "snmp"}
def make_dic_gnmap():
global loading
global services
supported = ['ssh','ftp','postgres','telnet','mysql','ms-sql-s','shell',
'vnc','imap','imaps','nntp','pcanywheredata','pop3','pop3s',
'exec','login','microsoft-ds','smtp', 'smtps','submission',
'svn','iss-realsecure','snmptrap','snmp']
port = None
with open(args.file, 'r') as nmap_file:
for line in nmap_file:
for name in supported:
matches = re.compile(r'([0-9][0-9]*)/open/[a-z][a-z]*//' + name)
try:
port = matches.findall(line)[0]
except:
continue
ip = re.findall( r'[0-9]+(?:\.[0-9]+){3}', line)
tmp_ports = matches.findall(line)
for tmp_port in tmp_ports:
name = NAME_MAP.get(name, name)
if name in services:
if tmp_port in services[name]:
services[name][tmp_port] += ip
else:
services[name][tmp_port] = ip
else:
services[name] = {tmp_port:ip}
loading = True
def make_dic_xml():
global loading
global services
supported = ['ssh','ftp','postgresql','telnet','mysql','ms-sql-s','rsh',
'vnc','imap','imaps','nntp','pcanywheredata','pop3','pop3s',
'exec','login','microsoft-ds','smtp','smtps','submission',
'svn','iss-realsecure','snmptrap','snmp']
tree = ET.parse(args.file)
root = tree.getroot()
for host in root.iter('host'):
ipaddr = host.find('address').attrib['addr']
for port in host.iter('port'):
cstate = port.find('state').attrib['state']
if cstate == "open":
try:
name = port.find('service').attrib['name']
tmp_port = port.attrib['portid']
iplist = ipaddr.split(',')
except:
continue
if name in supported:
name = NAME_MAP.get(name, name)
if name in services:
if tmp_port in services[name]:
services[name][tmp_port] += iplist
else:
services[name][tmp_port] = iplist
else:
services[name] = {tmp_port:iplist}
loading = True
def make_dic_json():
global loading
global services
supported = ['ssh','ftp','postgres','telnet','mysql','ms-sql-s','shell',
'vnc','imap','imaps','nntp','pcanywheredata','pop3','pop3s',
'exec','login','microsoft-ds','smtp', 'smtps','submission',
'svn','iss-realsecure','snmptrap','snmp']
with open(args.file, "r") as jsonlines_file:
for line in jsonlines_file:
data = json.loads(line)
try:
host, port, name = data["host"], data["port"], data["service"]
if name in supported:
name = NAME_MAP.get(name, name)
if name not in services:
services[name] = {}
if port not in services[name]:
services[name][port] = []
if host not in services[name][port]:
services[name][port].append(host)
except KeyError as e:
sys.stderr.write("\n[!] Field: " + str(e) + "is missing")
sys.stderr.write("\n[!] Please provide the json fields. ")
continue
loading = True
def brute(service,port,fname,output):
if args.userlist is None and args.username is None:
userlist = '/usr/share/brutespray/wordlist/'+service+'/user'
if not os.path.exists(userlist):
userlist = 'wordlist/'+service+'/user'
uarg = '-U'
elif args.userlist:
userlist = args.userlist
uarg = '-U'
elif args.username:
userlist = args.username
uarg = '-u'
if args.passlist is None and args.password is None:
passlist = '/usr/share/brutespray/wordlist/'+service+'/password'
if not os.path.exists(passlist):
passlist = 'wordlist/'+service+'/password'
parg = '-P'
elif args.passlist:
passlist = args.passlist
parg = '-P'
elif args.password:
passlist = args.password
parg = '-p'
if args.continuous:
cont = ''
else:
cont = '-F'
if service == "smtp":
aarg = "-m"
auth = "AUTH:LOGIN"
else:
aarg = ''
auth = ''
p = subprocess.Popen(['medusa', '-b', '-H', fname, uarg, userlist, parg, passlist, '-M', service, '-t', args.threads, '-n', port, '-T', args.hosts, cont, aarg, auth], stdout=subprocess.PIPE, stderr=subprocess.STDOUT, bufsize=-1)
out = "[" + colors.green + "+" + colors.normal + "] "
output_file = output + '/' + port + '-' + service + '-success.txt'
for line in iter(p.stdout.readline, b''):
print(line.decode('utf-8').strip('\n'))
sys.stdout.flush()
time.sleep(0.0001)
if 'SUCCESS' in line.decode('utf-8'):
f = open(output_file, 'a')
f.write(out + line.decode('utf-8'))
f.close()
def animate():
sys.stdout.write('\rStarting to brute, please make sure to use the right amount of ' + colors.green + 'threads(-t)' + colors.normal + ' and ' + colors.green + 'parallel hosts(-T)' + colors.normal + '... \n')
t_end = time.time() + 2
for c in itertools.cycle(['|', '/', '-', '\\']):
if not time.time() < t_end:
break
sys.stdout.write('\rOutput will be written to the folder: ./' + colors.green + args.output + colors.normal + "/ "+ c)
sys.stdout.flush()
time.sleep(0.1)
sys.stdout.write('\n\nBrute-Forcing... \n')
time.sleep(1)
def loading():
for c in itertools.cycle(['|', '/', '-', '\\']):
if loading == True:
break
sys.stdout.write('\rLoading File: ' + c)
sys.stdout.flush()
time.sleep(0.01)
def getInput(filename):
in_format = None
with open(filename) as f:
line = f.readlines()
if filename.endswith("gnmap"):
in_format = "gnmap"
if filename.endswith("json"):
in_format = "json"
if filename.endswith("xml"):
in_format = "xml"
if '{' in line[0]:
in_format = "json"
if '# Nmap' in line[0] and not 'Nmap' in line[1]:
in_format = "gnmap"
if ' \n")
menu_group = parser.add_argument_group(colors.lightblue + 'Menu Options' + colors.normal)
#menu_group.add_argument('-f', '--file', help="GNMAP or XML file to parse", required=False, default=None)
menu_group.add_argument('-f', '--file', help="GNMAP, JSON or XML file to parse", required=False, default=None)
menu_group.add_argument('-o', '--output', help="Directory containing successful attempts", default="brutespray-output")
menu_group.add_argument('-s', '--service', help="specify service to attack", default="all")
menu_group.add_argument('-t', '--threads', help="number of medusa threads", default="2")
menu_group.add_argument('-T', '--hosts', help="number of hosts to test concurrently", default="1")
menu_group.add_argument('-U', '--userlist', help="reference a custom username file", default=None)
menu_group.add_argument('-P', '--passlist', help="reference a custom password file", default=None)
menu_group.add_argument('-u', '--username', help="specify a single username", default=None)
menu_group.add_argument('-p', '--password', help="specify a single password", default=None)
menu_group.add_argument('-c', '--continuous', help="keep brute-forcing after success", default=False, action='store_true')
menu_group.add_argument('-i', '--interactive', help="interactive mode", default=False, action='store_true')
menu_group.add_argument('-m', '--modules', help="dump a list of available modules to brute", default=False, action='store_true')
menu_group.add_argument('-q', '--quiet', help="supress banner", default=False, action='store_true')
args = parser.parse_args()
if args.file is None and args.modules is False:
parser.error("argument -f/--file is required")
return args
if __name__ == "__main__":
args = parse_args()
if args.quiet == False:
print(banner)
else:
print(quiet_banner)
supported = ['ssh','ftp','telnet','vnc','mssql','mysql','postgresql','rsh',
'imap','nntp','pcanywhere','pop3',
'rexec','rlogin','smbnt','smtp',
'svn','vmauthd','snmp']
#temporary directory for ip addresses
if args.modules is True:
print(colors.lightblue + "Supported Services:\n" + colors.green)
print(('\n'.join(supported)))
print(colors.normal + "\n")
try:
tmppath = tempfile.mkdtemp(prefix="brutespray-tmp")
except:
sys.stderr.write("\nError while creating brutespray temp directory.")
exit(4)
if not os.path.exists(args.output):
os.mkdir(args.output)
if os.system("command -v medusa > /dev/null") != 0:
sys.stderr.write("Command medusa not found. Please install medusa before using brutespray")
exit(3)
if args.file is None:
sys.exit(0)
if args.passlist and not os.path.isfile(args.passlist):
sys.stderr.write("Passlist given does not exist. Please check your file or path\n")
exit(3)
if args.userlist and not os.path.isfile(args.userlist):
sys.stderr.write("Userlist given does not exist. Please check your file or path\n")
exit(3)
if os.path.isfile(args.file):
try:
t = threading.Thread(target=loading)
t.start()
in_format = getInput(args.file)
{
"gnmap": make_dic_gnmap,
"xml": make_dic_xml,
"json": make_dic_json
}[in_format]()
except:
print("\nFormat failed!\n")
loading = True
sys.exit(0)
if args.interactive is True:
interactive()
animate()
if services == {}:
print("\nNo brutable services found.\n Please check your Nmap file.")
else:
print("\nError loading file, please check your filename.")
to_scan = args.service.split(',')
for service in services:
if service in to_scan or to_scan == ['all']:
for port in services[service]:
fname = tmppath + '/' +service + '-' + port
iplist = services[service][port]
f = open(fname, 'w+')
for ip in iplist:
f.write(ip + '\n')
f.close()
brute_process = Process(target=brute, args=(service,port,fname,args.output))
brute_process.start()
#need to wait for all of the processes to run...
#shutil.rmtree(tmppath, ignore_errors=False, onerror=None)
brutespray-1.6.8/requirements.txt 0000664 0000000 0000000 00000000024 13651223234 0017207 0 ustar 00root root 0000000 0000000 argcomplete==1.10.0
brutespray-1.6.8/wordlist/ 0000775 0000000 0000000 00000000000 13651223234 0015576 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/ftp/ 0000775 0000000 0000000 00000000000 13651223234 0016367 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/ftp/password 0000664 0000000 0000000 00000003513 13651223234 0020156 0 ustar 00root root 0000000 0000000
111111
12345
123456
12345678
123qwe
1qaz2wsx
2003
2008
95
98
abc
abc123
abcd123
account
admin
adminadmin
administator
admins
agata
air
alpine
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
bankbank
baseball
basketball
bill
bird
burp
change
changelater
changeme
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
cvsadm
database
default
dev
devdev
devdevdev
dirt
dragon
earth
eqidemo
fire
football
ftp
ftp123
ftpuser
goat
god
guessme
hugs
info
john
letmein
login
march2011
marketing
master
microsoft
mike
monkey
mysql
network
networking
networks
news
nobody
nt
oracle
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
qa
qwerty
qwertyuiop
rain
root
sa
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
snow
solo
someday
spam
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sysadm
sysadmin
system
techsupport
test
test1
test123
test2
test3
test4
tester
testing
testing123
testsql
test-sql3
testtest
testuser
trust
unchanged
unknown
uploader
user
vista
water
web
webadmin
webmaster
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
brutespray-1.6.8/wordlist/ftp/user 0000664 0000000 0000000 00000000115 13651223234 0017265 0 ustar 00root root 0000000 0000000 anonymous
oracle
root
test
uploader
john
bill
mike
agata
ftp
admin
marketing
brutespray-1.6.8/wordlist/imap/ 0000775 0000000 0000000 00000000000 13651223234 0016524 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/imap/password 0000664 0000000 0000000 00000004341 13651223234 0020313 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/imap/user 0000664 0000000 0000000 00000000143 13651223234 0017423 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/mssql/ 0000775 0000000 0000000 00000000000 13651223234 0016735 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/mssql/password 0000664 0000000 0000000 00000003162 13651223234 0020524 0 ustar 00root root 0000000 0000000
111111
123456
12345678
1qaz2wsx
2003
2008
95
98
abc
abc123
abcd123
account
admin
adminadmin
administator
admins
air
alpine
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
bankbank
baseball
basketball
bird
burp
change
changelater
changeme
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
database
default
dev
devdev
devdevdev
dirt
dragon
earth
fire
football
goat
god
guessme
hugs
letmein
login
march2011
master
microsoft
monkey
network
networking
networks
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
Password123
password2
Password2
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
qa
qwerty
qwertyuiop
rain
sa
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
snow
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
trust
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
brutespray-1.6.8/wordlist/mssql/user 0000664 0000000 0000000 00000000016 13651223234 0017633 0 ustar 00root root 0000000 0000000 sa
root
admin
brutespray-1.6.8/wordlist/mysql/ 0000775 0000000 0000000 00000000000 13651223234 0016743 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/mysql/password 0000664 0000000 0000000 00000000032 13651223234 0020523 0 ustar 00root root 0000000 0000000 password
admin
root
toor
brutespray-1.6.8/wordlist/mysql/user 0000664 0000000 0000000 00000000013 13651223234 0017636 0 ustar 00root root 0000000 0000000 root
admin
brutespray-1.6.8/wordlist/nntp/ 0000775 0000000 0000000 00000000000 13651223234 0016555 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/nntp/password 0000664 0000000 0000000 00000004341 13651223234 0020344 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/nntp/user 0000664 0000000 0000000 00000000143 13651223234 0017454 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/pcanywhere/ 0000775 0000000 0000000 00000000000 13651223234 0017743 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/pcanywhere/password 0000664 0000000 0000000 00000004351 13651223234 0021533 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
recover
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/pcanywhere/user 0000664 0000000 0000000 00000000155 13651223234 0020645 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant
symantec
brutespray-1.6.8/wordlist/postgres/ 0000775 0000000 0000000 00000000000 13651223234 0017444 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/postgres/password 0000664 0000000 0000000 00000004351 13651223234 0021234 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
recover
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/postgres/user 0000664 0000000 0000000 00000000024 13651223234 0020341 0 ustar 00root root 0000000 0000000 root
admin
postgres
brutespray-1.6.8/wordlist/rexec/ 0000775 0000000 0000000 00000000000 13651223234 0016704 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/rexec/password 0000664 0000000 0000000 00000004351 13651223234 0020474 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
recover
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/rexec/user 0000664 0000000 0000000 00000000143 13651223234 0017603 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/rlogin/ 0000775 0000000 0000000 00000000000 13651223234 0017070 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/rlogin/password 0000664 0000000 0000000 00000004351 13651223234 0020660 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
recover
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/rlogin/user 0000664 0000000 0000000 00000000143 13651223234 0017767 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/rsh/ 0000775 0000000 0000000 00000000000 13651223234 0016372 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/rsh/password 0000664 0000000 0000000 00000004351 13651223234 0020162 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
recover
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/rsh/user 0000664 0000000 0000000 00000000143 13651223234 0017271 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/smbnt/ 0000775 0000000 0000000 00000000000 13651223234 0016721 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/smbnt/password 0000664 0000000 0000000 00000004351 13651223234 0020511 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
recover
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/smbnt/user 0000664 0000000 0000000 00000000143 13651223234 0017620 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/smtp/ 0000775 0000000 0000000 00000000000 13651223234 0016561 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/smtp/password 0000664 0000000 0000000 00000004351 13651223234 0020351 0 ustar 00root root 0000000 0000000
000000
102030
111111
11111111
112233
121212
123123
123123123
123321
1234
12345
123456
1234567
12345678
123456789
1234567890
123654
123qwe
1q2w3e
1q2w3e4r
1qaz2wsx
2003
2008
222222
555555
654321
666666
753951
7777777
95
98
987654321
aaaaaa
abc
abc123
abcd123
abcd1234
abcdef
account
admin
adminadmin
administator
admins
adobe1
adobe123
adobeadobe
air
alexander
alpine
andrea
andrew
asdasd
asdfasdf
asdfgh
asdfghj
asdfghjkl
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
azerty
bankbank
baseball
basketball
bird
burp
buster
change
changelater
changeme
charlie
chocolate
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
computer
daniel
database
default
dev
devdev
devdevdev
dirt
dragon
dreamweaver
earth
fdsa
fire
football
freedom
fuckyou
ginger
goat
god
guessme
hannah
hugs
iloveyou
internet
jennifer
jessica
jordan
joshua
killer
letmein
liverpool
login
macromedia
maggie
march2011
master
matrix
michael
michelle
microsoft
monkey
network
networking
networks
nicole
nt
P@55w0rd
P@55w0rd!
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
pepper
photoshop
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
purple
qa
qazwsx
qwerty
qwertyuiop
rain
recover
sa
samsung
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
shadow
snoopy1
snow
soccer
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sunshine
superman
sysadmin
test
testing
testing123
testsql
test-sql3
testtest
thomas
tigger
trust
trustno1
unchanged
unknown
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
whatever
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
zxcvbnm
brutespray-1.6.8/wordlist/smtp/user 0000664 0000000 0000000 00000000143 13651223234 0017460 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/ssh/ 0000775 0000000 0000000 00000000000 13651223234 0016373 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/ssh/password 0000664 0000000 0000000 00000004075 13651223234 0020166 0 ustar 00root root 0000000 0000000
111111
123456
12345678
1qaz2wsx
2003
2008
95
98
abc
abc123
abcd123
account
admin
adminadmin
administator
admins
air
alpine
ascend
attack
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
ax400
bagabu
bankbank
baseball
basketball
bird
blablabla
blender
brightmail
burp
calvin
change
changelater
changeme
changethis
Cisco
cms500
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
database
davox
dbps
default
dev
devdev
devdevdev
dirt
dragon
earth
fibranne
fire
fivranne
football
goat
god
guessme
honey
hugs
ibm
jstwo
kn1TG7psLu
letacla
letmein
login
march2011
master
microsoft
monitor
monkey
mpegvideo
network
networking
networks
NeXT
nsi
nt
owaspbwa
P@55w0rd
P@55w0rd!
par0t
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
permit
pixmet2003
powerapp
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
qa
QNX
qwerty
qwertyuiop
rain
resumix
!root
root
ROOT500
rootme
rootpass
sa
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
snow
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
summer2018
Summer2018
summer2019
Summer2019
summer2020
Summer2020
sysadmin
t00lk1t
test
testing
testing123
testsql
test-sql3
testtest
tini
toor
trendimsa1.0
trust
tslinux
turnkey
uClinux
unchanged
unknown
vagrant
vertex25
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
Winter2018
winter2018
Winter2019
winter2019
Winter2020
winter2020
xp
brutespray-1.6.8/wordlist/ssh/user 0000664 0000000 0000000 00000000162 13651223234 0017273 0 ustar 00root root 0000000 0000000 administrator
admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant
brutespray-1.6.8/wordlist/svn/ 0000775 0000000 0000000 00000000000 13651223234 0016404 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/svn/password 0000664 0000000 0000000 00000003671 13651223234 0020200 0 ustar 00root root 0000000 0000000
111111
123456
12345678
1qaz2wsx
2003
2008
95
98
abc
abc123
abcd123
account
admin
adminadmin
administator
admins
air
alpine
ascend
attack
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
ax400
bagabu
bankbank
baseball
basketball
bird
blablabla
blender
brightmail
burp
calvin
change
changelater
changeme
changethis
Cisco
cms500
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
database
davox
dbps
default
dev
devdev
devdevdev
dirt
dragon
earth
fibranne
fire
fivranne
football
goat
god
guessme
honey
hugs
ibm
jstwo
kn1TG7psLu
letacla
letmein
login
march2011
master
microsoft
monitor
monkey
mpegvideo
network
networking
networks
NeXT
nsi
nt
owaspbwa
P@55w0rd
P@55w0rd!
par0t
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
permit
pixmet2003
powerapp
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
qa
QNX
qwerty
qwertyuiop
rain
resumix
!root
root
ROOT500
rootme
rootpass
sa
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
snow
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sysadmin
t00lk1t
test
testing
testing123
testsql
test-sql3
testtest
tini
toor
trendimsa1.0
trust
tslinux
turnkey
uClinux
unchanged
unknown
vagrant
vertex25
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
brutespray-1.6.8/wordlist/svn/user 0000664 0000000 0000000 00000000143 13651223234 0017303 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/telnet/ 0000775 0000000 0000000 00000000000 13651223234 0017071 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/telnet/password 0000664 0000000 0000000 00000004345 13651223234 0020664 0 ustar 00root root 0000000 0000000
111111
123456
12345678
1qaz2wsx
2003
2008
95
98
abc
abc123
abcd123
account
admin
adminadmin
administator
admins
air
alpine
ascend
attack
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
ax400
bagabu
bankbank
baseball
basketball
bird
blablabla
blender
brightmail
burp
calvin
change
changelater
changeme
changethis
Cisco
cms500
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
database
davox
dbps
default
dev
devdev
devdevdev
dirt
dragon
earth
fibranne
fire
fivranne
football
goat
god
guessme
honey
hugs
ibm
jstwo
kn1TG7psLu
letacla
letmein
login
march2011
master
microsoft
monitor
monkey
mpegvideo
network
networking
networks
NeXT
nsi
nt
owaspbwa
P@55w0rd
P@55w0rd!
par0t
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
permit
pixmet2003
powerapp
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
qa
QNX
qwerty
qwertyuiop
rain
resumix
!root
root
ROOT500
rootme
rootpass
sa
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
snow
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sysadmin
t00lk1t
test
testing
testing123
testsql
test-sql3
testtest
tini
toor
trendimsa1.0
trust
tslinux
turnkey
uClinux
unchanged
unknown
vagrant
vertex25
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
wapnd03cm_dkbs_dap2555
wapnd04cm_dkbs_dap3525
wapnd15_dlob_dap1522b
wrgac01_dlob.hans_dir865
wrgg15_di524
wrgg19_c_dlwbr_dir300
wrgn22_dlwbr_dir615
wrgn23_dlwbr_dir300b
wrgn23_dlwbr_dir600b
wrgn28_dlob_dir412
wrgn39_dlob.hans_dir645
wrgn39_dlob.hans_dir645_V1
wrgn49_dlob_dir600b
wrgnd08_dlob_dir815
brutespray-1.6.8/wordlist/telnet/user 0000664 0000000 0000000 00000000162 13651223234 0017771 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant
Alphanetworks
brutespray-1.6.8/wordlist/vmauthd/ 0000775 0000000 0000000 00000000000 13651223234 0017246 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/vmauthd/password 0000664 0000000 0000000 00000003671 13651223234 0021042 0 ustar 00root root 0000000 0000000
111111
123456
12345678
1qaz2wsx
2003
2008
95
98
abc
abc123
abcd123
account
admin
adminadmin
administator
admins
air
alpine
ascend
attack
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
ax400
bagabu
bankbank
baseball
basketball
bird
blablabla
blender
brightmail
burp
calvin
change
changelater
changeme
changethis
Cisco
cms500
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
database
davox
dbps
default
dev
devdev
devdevdev
dirt
dragon
earth
fibranne
fire
fivranne
football
goat
god
guessme
honey
hugs
ibm
jstwo
kn1TG7psLu
letacla
letmein
login
march2011
master
microsoft
monitor
monkey
mpegvideo
network
networking
networks
NeXT
nsi
nt
owaspbwa
P@55w0rd
P@55w0rd!
par0t
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
permit
pixmet2003
powerapp
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
qa
QNX
qwerty
qwertyuiop
rain
resumix
!root
root
ROOT500
rootme
rootpass
sa
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
snow
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sysadmin
t00lk1t
test
testing
testing123
testsql
test-sql3
testtest
tini
toor
trendimsa1.0
trust
tslinux
turnkey
uClinux
unchanged
unknown
vagrant
vertex25
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
brutespray-1.6.8/wordlist/vmauthd/user 0000664 0000000 0000000 00000000143 13651223234 0020145 0 ustar 00root root 0000000 0000000 admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant brutespray-1.6.8/wordlist/vnc/ 0000775 0000000 0000000 00000000000 13651223234 0016364 5 ustar 00root root 0000000 0000000 brutespray-1.6.8/wordlist/vnc/password 0000664 0000000 0000000 00000003671 13651223234 0020160 0 ustar 00root root 0000000 0000000
111111
123456
12345678
1qaz2wsx
2003
2008
95
98
abc
abc123
abcd123
account
admin
adminadmin
administator
admins
air
alpine
ascend
attack
autumn2013
Autumn2013
autumn2014
Autumn2014
autumn2015
Autumn2015
autumn2016
Autumn2016
autumn2017
Autumn2017
ax400
bagabu
bankbank
baseball
basketball
bird
blablabla
blender
brightmail
burp
calvin
change
changelater
changeme
changethis
Cisco
cms500
company
company!
company1
company1!
company123
complex
complex1
complex2
complex3
complexpassword
database
davox
dbps
default
dev
devdev
devdevdev
dirt
dragon
earth
fibranne
fire
fivranne
football
goat
god
guessme
honey
hugs
ibm
jstwo
kn1TG7psLu
letacla
letmein
login
march2011
master
microsoft
monitor
monkey
mpegvideo
network
networking
networks
NeXT
nsi
nt
owaspbwa
P@55w0rd
P@55w0rd!
par0t
pass
PassSql12
password
password!
Password!
password1
Password1
Password1!
password12
Password12
password123
password2
Password2
permit
pixmet2003
powerapp
princess
private
P@ssw0rd
P@ssw0rd!
P@ssword!
qa
QNX
qwerty
qwertyuiop
rain
resumix
!root
root
ROOT500
rootme
rootpass
sa
sasa
secret
secret!
secret1!
secret12
secret1212
secret123
secuirty3
security
security1
security3
server
snow
solo
someday
spring2013
Spring2013
spring2014
Spring2014
spring2015
Spring2015
spring2016
Spring2016
spring2017
Spring2017
sql
sql2000
sql2003
sql2005
sql2008
sql2009
sql2010
sql2011
sqlaccount
sqlpass
sqlpass123
sqlpassword
sqlserver
Sqlserver
SqlServer
sqlserver2000
sqlserver2005
sqlsql
sqlsqlsqlsql
SQLSQLSQLSQL
sqlsqlsqlsqlsql
sqlsvr
starwars
summer2013
Summer2013
summer2014
Summer2014
summer2015
Summer2015
summer2016
Summer2016
summer2017
Summer2017
sysadmin
t00lk1t
test
testing
testing123
testsql
test-sql3
testtest
tini
toor
trendimsa1.0
trust
tslinux
turnkey
uClinux
unchanged
unknown
vagrant
vertex25
vista
water
welcome
welcome1
Welcome1212
Welcome123
Welcome1234
welcome2
wicked
winter2013
Winter2013
winter2014
Winter2014
winter2015
Winter2015
winter2016
Winter2016
winter2017
Winter2017
xp
brutespray-1.6.8/wordlist/vnc/user 0000664 0000000 0000000 00000000163 13651223234 0017265 0 ustar 00root root 0000000 0000000
administrator
admin
manager
root
cisco
apc
pass
security
user
system
sys
wampp
newuser
xampp-dav-unsecure
vagrant