SkillAgentSearch skills...

WordListsForHacking

Brazilian pentest wordlists: 1.5M+ passwords, 1.1K+ usernames, 2.4K+ default credential pairs. PT-BR dictionary + cultural phrases + manufacturer defaults. Red team, SOC training, security workshops.

Install / Use

/learn @mrhenrike/WordListsForHacking

README

WordListsForHacking

Author: André Henrique (@mrhenrike)
Version: 2.0.0 · License: MIT · Updated: 2026-03-30

Curated wordlists for authorized penetration testing, red team exercises, SOC training, and security workshops — focused on Brazilian environments and global device defaults.


Files

| File | Type | Lines (approx.) | Purpose | |------|------|-----------------|---------| | wlist_brasil.lst | Passwords | ~1.4M | Brazilian passwords: PT-BR dictionary + real leaks + cultural phrases + leet variations | | username_br.lst | Usernames | ~350 | Brazilian and global usernames: corporate roles, default accounts, MSP/MSSP patterns | | default-creds-combo.lst | user:password | ~4,500 | Default credentials for 200+ device/software vendors — no length filtering | | labs_passwords.lst | Passwords | ~116 | Passwords used in Prof. André's classes and security events | | labs_users.lst | Usernames | ~10 | Usernames used in classes and events | | labs_mikrotik_pass.lst | Passwords | ~38 | MikroTik-specific passwords for tool demonstrations |


Why Pure Numeric Sequences Are NOT Included

Purely numeric sequences (PINs, dates, CPF/CNPJ numbers, phone numbers, ID numbers) are intentionally omitted from wlist_brasil.lst and username_br.lst.

Reason: Tools like crunch, cupp, and hashcat --increment generate these sets locally in seconds with far greater efficiency than maintaining millions of static numeric lines in a file. Including them would inflate file size without adding real attack value.

How to Generate Numeric Wordlists with Crunch

Install Crunch:

# Debian / Ubuntu / Kali
sudo apt install crunch

# Arch Linux / BlackArch
sudo pacman -S crunch

# Fedora / RHEL
sudo dnf install crunch

All 6- and 8-digit combinations

# 6 digits: 000000 to 999999 (1,000,000 entries)
crunch 6 6 0123456789 -o numeric-6.lst

# 8 digits: 00000000 to 99999999 (100,000,000 entries)
crunch 8 8 0123456789 -o numeric-8.lst

# 6 to 8 digits in one file
crunch 6 8 0123456789 -o numeric-6to8.lst

Dates — Brazilian formats

# DDMMYYYY (e.g., 15081990) — years 2000 to 2025
for y in $(seq 2000 2025); do
  crunch 8 8 -t "%%$$${y}" >> datas-ddmmyyyy.lst 2>/dev/null
done

# YYYYMMDD
for y in $(seq 2000 2025); do
  crunch 8 8 -t "${y}$$%%" >> datas-yyyymmdd.lst 2>/dev/null
done

# DDMMYY (6 digits)
crunch 6 6 0123456789 -t "%%$$%%" -o datas-ddmmyy.lst

# YYMMDD
crunch 6 6 0123456789 -t "%%$$%%" -o datas-yymmdd.lst

CPF (Brazilian tax ID — 11 digits, no punctuation)

# All combinations — note: ~100 GB uncompressed; use prefix filters
crunch 11 11 0123456789 -o cpf-all.lst

# Filter by São Paulo prefix (011–019):
crunch 11 11 0123456789 -t "01%%%%%%%%%%" -o cpf-sp.lst

CNPJ (Brazilian company ID — 14 digits)

# All combinations
crunch 14 14 0123456789 -o cnpj-all.lst

# Root (8 digits) + fixed branch "0001" + check digits
crunch 8 8 0123456789 -t "%%%%%%%%" | awk '{print $0"00010001"}' > cnpj-filtered.lst

Phone numbers

# Mobile without DDD (9 digits, starts with 9)
crunch 9 9 0123456789 -t "9%%%%%%%%" -o celular-sem-ddd.lst

# Mobile with São Paulo DDD 11
crunch 11 11 0123456789 -t "119%%%%%%%%" -o celular-sp.lst

# Landline without DDD (8 digits)
crunch 8 8 0123456789 -o fixo-sem-ddd.lst

# Landline with DDD 11
crunch 10 10 0123456789 -t "11%%%%%%%%" -o fixo-sp.lst

# All valid DDDs (mobile)
for ddd in 11 12 13 14 15 16 17 18 19 21 22 24 27 28 31 32 33 34 35 37 38 \
           41 42 43 44 45 46 47 48 49 51 53 54 55 61 62 63 64 65 66 67 68 69 \
           71 73 74 75 77 79 81 82 83 84 85 86 87 88 89 91 92 93 94 95 96 97 98 99; do
  crunch 11 11 0123456789 -t "${ddd}9%%%%%%%%" >> celulares-todos-ddd.lst 2>/dev/null
done

Tips for Hashcat and Hydra

# Hashcat — brute-force numeric without a wordlist file
hashcat -a 3 hash.txt ?d?d?d?d?d?d          # 6 digits
hashcat -a 3 hash.txt ?d?d?d?d?d?d?d?d      # 8 digits
hashcat -a 3 hash.txt -i --increment-min=6  # 6 to max

# Pipe Crunch directly into Hydra
crunch 8 8 0123456789 | hydra -l admin -P - 192.168.1.1 http-get /login

Other Recommended Wordlists

# RockYou (14M passwords — classic)
/usr/share/wordlists/rockyou.txt  # pre-installed on Kali

# SecLists (Daniel Miessler — comprehensive collection)
sudo apt install seclists
git clone --depth 1 https://github.com/danielmiessler/SecLists.git

# CrackStation (1.49 billion real leaked passwords)
# https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm

# BRDumps (Brazil-specific wordlists)
git clone https://github.com/BRDumps/wordlists.git

# Brazilian Portuguese system dictionary (Kali/Debian)
sudo apt install wbrazilian
# Location: /usr/share/dict/brazilian

Methodology

This wordlist was built using:

  1. Public research — NordPass annual reports, HIBP public datasets, academic studies on Brazilian password habits (2020–2025)
  2. Brazilian Portuguese dictionary — ~320,000 words from the LibreOffice/Mozilla spell-check corpus, filtered to ≥6 characters, with 7 orthographic variations each
  3. Algorithmic variation engine — rich leet-speak mappings (multiple substitutions per character), case mutations, accent stripping, and suffix patterns (123, @123, 20242026) based on documented PT-BR human password-writing habits
  4. Cultural phrases — viral expressions, song lyrics, political slogans and memes from 2014–2025, sourced from public media and social platforms
  5. Corporate patterns — MSP/MSSP × client naming conventions derived from public job postings on LinkedIn, InfoJobs and Vagas.com.br; patterns follow documented human tendencies when creating credentials in managed environments (PCFG model, Weir et al.)
  6. Manufacturer defaults — DefaultCreds-cheat-sheet (ihebski/GitHub, 3,755+ entries), ICS default passwords (arnaudsoullie/GitHub), product manuals and FCC ID databases
  7. Linguistic basis — variation rules are grounded in corpus linguistics of PT-BR writing patterns, including phonetic substitutions (ç→c, ã→a) and keyboard-walk sequences documented in password cracking literature

⚠️ Ethical Disclaimer

If a password belonging to you or your organization appears in this wordlist, it means it matched one or more deterministic rules described above — not that it was extracted from any system, database, vault, PAM, or credential store.

Any reasonably skilled attacker or programmer could independently construct the same entries by applying the same publicly documented algorithms.

This wordlist is a security awareness tool. It demonstrates that:

  • Patterns based on company names, years, and keyboard walks are trivially guessable
  • Leet-speak does NOT make a password strong if the base word is in a dictionary
  • Brazilian cultural references are among the first candidates in targeted attacks

Never use patterns from this list as real credentials. Use a password manager and generate truly random credentials.


Check If Your Password Is in This List

You can quickly verify whether your password appears in wlist_brasil.lst using built-in tools — no extra software required.

⚠️ Run this check offline, after downloading the file locally. Never type your real password into an online form or transmit it over a network.

Step 1 — Download the file

# Linux / macOS
wget https://raw.githubusercontent.com/mrhenrike/WordListsForHacking/main/wlist_brasil.lst
# or
curl -O https://raw.githubusercontent.com/mrhenrike/WordListsForHacking/main/wlist_brasil.lst
# Windows PowerShell
Invoke-WebRequest `
  -Uri "https://raw.githubusercontent.com/mrhenrike/WordListsForHacking/main/wlist_brasil.lst" `
  -OutFile "wlist_brasil.lst"

Step 2 — Search for your password

Replace yourpassword with the password you want to check.

# Linux / macOS — exact match, case-sensitive
grep -Fx "yourpassword" wlist_brasil.lst \
  && echo "⚠️  FOUND — CHANGE YOUR PASSWORD NOW" \
  || echo "✓  Not found in this list"
# Linux / macOS — case-insensitive (catches leet-speak variants too)
grep -Fix "yourpassword" wlist_brasil.lst \
  && echo "⚠️  FOUND — CHANGE YOUR PASSWORD NOW" \
  || echo "✓  Not found in this list"
# Windows PowerShell — exact match
$result = Select-String -Path "wlist_brasil.lst" -Pattern "^yourpassword$" -CaseSensitive
if ($result) { Write-Host "⚠️  FOUND — CHANGE YOUR PASSWORD NOW" -ForegroundColor Red }
else          { Write-Host "✓  Not found in this list" -ForegroundColor Green }
:: Windows CMD — exact match
findstr /x /c:"yourpassword" wlist_brasil.lst
:: If output appears: your password was found. Change it immediately.

Step 3 — What to do if your password is found

  1. Change it immediately in every service where you use it
  2. Never reuse passwords — each account must have a unique credential
  3. Use a password manager: Bitwarden (free/open-source), KeePass, 1Password, or your OS built-in vault
  4. Generate truly random passwords — avoid: names, dates, keyboard walks, company names, football teams, song lyrics, or leet-speak of dictionary words
  5. Enable MFA/2FA on every account that supports it

Important: if your password is found here, it does not mean it was extracted from a specific breach, vault, or PAM system. It means your password follows a predictable pattern that this wordlist was built to detect — and that any motivated attacker would try first. Treat it as a wake-up call.


Legal Notice

  • Use only in environments where you have explicit written authorization
  • Never use for unauthorized access to any system
  • Author accepts no liability for misuse
  • Maintain attribution when redistributing

Related Skills

View on GitHub
GitHub Stars7
CategoryDevelopment
Updated1d ago
Forks0

Languages

Python

Security Score

90/100

Audited on Apr 5, 2026

No findings