Introduction
Learn what these wordlists contain and how they are structured
Quick Start
Download the wordlists and run your first attack in minutes
WPScan Guide
Step-by-step WordPress brute-force using WPScan
Hydra Guide
HTTP POST form attacks against xmlrpc.php using Hydra
What’s included
The repository contains two wordlist files ready to use with your favourite pentesting tool:| File | Entries | Contents |
|---|---|---|
users.txt | 1,200 | Common usernames for servers, web apps, and corporate accounts |
passwords.txt | ~1,500 | Common passwords, patterns, and typical weak credentials |
These wordlists are exclusively for educational lab environments. Never use them against systems you do not own or have explicit written permission to test.
Get started
Download the wordlists
Clone the repository or download
users.txt and passwords.txt directly from GitHub.Set up your lab target
Deploy a local WordPress instance with XML-RPC enabled, or use your CTF challenge environment.
Username wordlist
Explore the 1,200 username entries and their categories
Password wordlist
Explore the ~1,500 password entries and their patterns
Attack methodology
Understand the XML-RPC attack surface and best practices
Legal & ethics
Read the legal notice before using these tools