This repository contains wordlists intended solely for ethical and legal purposes, including:
- Educational use, such as security awareness training.
- Security testing with explicit permission from system owners.
- Responsible disclosure and research in cybersecurity in compliance with applicable laws.
By using this repository's content, you agree to comply with all local, national, and international laws related to cybersecurity and data protection.
You may use these wordlists only if you:
- Have explicit authorization to test a system’s security.
- Use them for educational, research, or responsible disclosure purposes.
- Ensure compliance with all relevant laws and ethical standards.
You must NOT use these wordlists for:
- Unauthorized access or hacking of systems without permission.
- Illegal activities, such as brute-force attacks on systems you do not own or have explicit permission to test.
- Violating privacy laws by using real-world leaked credentials.
- Any action that breaches local, national or international cybercrime laws.
This repository is provided "as is" without any warranties. The authors and contributors are not responsible for any misuse, damage, or legal consequences resulting from the use of these wordlists. Users assume full responsibility for their actions.