Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
PinoyWH1Z committed Feb 21, 2024
1 parent 5c1e3ca commit f76a34d
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,21 +11,21 @@

This repository contains a collection of wordlists to aid in locating or brute-forcing SSH private key file names. These wordlists can be useful for penetration testers, security researchers, and anyone else interested in assessing the security of SSH configurations.

## Wordlist Files
## Wordlist Files 📝

- **ssh-priv-key-loot-common.txt**: Default and common naming conventions for SSH private key files.
- **ssh-priv-key-loot-medium.txt**: Probable file names without backup file extensions.
- **ssh-priv-key-loot-extended.txt**: Probable file names with backup file extensions.
- **ssh-priv-key-loot-\*_w_gui.txt**: Includes file names simulating Ctrl+C and Ctrl+V on servers with a GUI.

## Usage
## Usage 🚀

These wordlists can be used with tools such as Burp Intruder, Hydra, custom python scripts, or any other bruteforcing tool that supports custom wordlists. They can help expand the scope of your brute-forcing or enumeration efforts when targeting SSH private key files.

## Acknowledgements
## Acknowledgements 🙏

This wordlist repository was inspired by John Hammond in his vlog "[Don't Forget This One Hacking Trick.](https://www.youtube.com/watch?v=2rqb3YSa1SE)"

## Disclaimer
## Disclaimer ⚠️

Please use these wordlists responsibly and only on systems you are authorized to test. Unauthorized use is illegal.

0 comments on commit f76a34d

Please sign in to comment.