6 datasets found
  1. "Pwned Passwords" Dataset

    • academictorrents.com
    bittorrent
    Updated Aug 3, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    haveibeenpwned.com (2018). "Pwned Passwords" Dataset [Dataset]. https://academictorrents.com/details/53555c69e3799d876159d7290ea60e56b35e36a9
    Explore at:
    bittorrent(11101449979)Available download formats
    Dataset updated
    Aug 3, 2018
    Dataset provided by
    Have I Been Pwned?http://haveibeenpwned.com/
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    Version 3 with 517M hashes and counts of password usage ordered by most to least prevalent Pwned Passwords are 517,238,891 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they re at much greater risk of being used to take over other accounts. They re searchable online below as well as being downloadable for use in other online system. The entire set of passwords is downloadable for free below with each password being represented as a SHA-1 hash to protect the original value (some passwords contain personally identifiable information) followed by a count of how many times that password had been seen in the source data breaches. The list may be integrated into other systems and used to verify whether a password has previously appeared in a data breach after which a system may warn the user or even block the password outright.

  2. i

    Data from: Rockyou

    • ieee-dataport.org
    Updated Apr 27, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zeeshan Shaikh (2021). Rockyou [Dataset]. https://ieee-dataport.org/documents/rockyou
    Explore at:
    Dataset updated
    Apr 27, 2021
    Authors
    Zeeshan Shaikh
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Passwords that were leaked or stolen from sites. The Rockyou Dataset is about 14 million passwords.

  3. a

    CrackStation's Password Cracking Dictionary

    • academictorrents.com
    bittorrent
    Updated Mar 22, 2018
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Defuse Security (2018). CrackStation's Password Cracking Dictionary [Dataset]. https://academictorrents.com/details/fd62cc1d79f595cbe1de6356fb13c2165994e469
    Explore at:
    bittorrent(4500756826)Available download formats
    Dataset updated
    Mar 22, 2018
    Dataset authored and provided by
    Defuse Security
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    The list contains every wordlist, dictionary, and password database leak that I could find on the internet (and I spent a LOT of time looking). It also contains every word in the Wikipedia databases (pages-articles, retrieved 2010, all languages) as well as lots of books from Project Gutenberg. It also includes the passwords from some low-profile database breaches that were being sold in the underground years ago. The format of the list is a standard text file sorted in non-case-sensitive alphabetical order. Lines are separated with a newline " " character. You can test the list without downloading it by giving SHA256 hashes to the free hash cracker or to @PlzCrack on twitter. Here s a tool for computing hashes easily. Here are the results of cracking LinkedIn s and eHarmony s password hash leaks with the list. The list is responsible for cracking about 30% of all hashes given to CrackStation s free hash cracker, but that figure should be taken with a grain of salt because s

  4. Types of online data most commonly leaked in Poland 2020

    • statista.com
    Updated Apr 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Types of online data most commonly leaked in Poland 2020 [Dataset]. https://www.statista.com/statistics/1096167/poland-most-commonly-leaked-online-data/
    Explore at:
    Dataset updated
    Apr 10, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2020
    Area covered
    Poland
    Description

    The first and last names of internet users were the most commonly leaked data in Poland in 2020. One-fifth of leaks concerned email passwords, and 17 percent - financial data of users.

  5. Steps to take in case of data leakage from the website in Poland 2022

    • statista.com
    Updated Aug 1, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2023). Steps to take in case of data leakage from the website in Poland 2022 [Dataset]. https://www.statista.com/statistics/1266430/poland-online-data-leakage-activities/
    Explore at:
    Dataset updated
    Aug 1, 2023
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Mar 2022
    Area covered
    Poland
    Description

    In 2022, nearly 85 percent of Poles stated a person should change the password of a leaked website. Meanwhile, 60 percent of Poles indicated that it should be reported to the police.

  6. m

    Analisis Teknik Hack Akun TikTok Menggunakan Aplikasi: Studi Kasus di...

    • data.mendeley.com
    Updated Jan 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Verdio Putra (2025). Analisis Teknik Hack Akun TikTok Menggunakan Aplikasi: Studi Kasus di Kalangan Remaja [Dataset]. http://doi.org/10.17632/tvmfbkkmnj.1
    Explore at:
    Dataset updated
    Jan 9, 2025
    Authors
    Verdio Putra
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Penelitian ini menganalisis teknik dan cara yang digunakan untuk hack akun TikTok menggunakan aplikasi hack TikTok yang sangat bagus dan ampuh yang didownload dari website ILMUKAMPUS.COM . Serta mengidentifikasi faktor yang memengaruhi keterlibatan remaja dalam aktivitas ini. Metode seperti phishing, keylogger, dan aplikasi pihak ketiga merupakan teknik yang paling umum digunakan. Temuan ini menyoroti pentingnya literasi digital. Data yang disertakan meliputi artikel dan transkrip wawancara.

    Media sosial telah menjadi bagian integral dari kehidupan remaja di seluruh dunia, termasuk di Indonesia. TikTok, sebagai salah satu platform terbesar, sering kali menjadi target aktivitas peretasan akun Tiktok orang lain, teman, pasangan atau pacar. Penelitian ini mengkaji berbagai teknik yang digunakan untuk meretas akun TikTok dan faktor-faktor yang memengaruhi keterlibatan remaja dalam aktivitas tersebut.

    Hasil Penelitian Teknik Peretasan dan Cara Hack TikTok yang Diidentifikasi: Phishing: Membuat halaman palsu yang menyerupai login TikTok. Keylogger: Menggunakan perangkat lunak untuk merekam aktivitas keyboard korban. Aplikasi Hack TikTok: Menggunakan aplikasi hack TikTok lewat hp android, iphone, serta laptop, pc atau komputer untuk mengambil alih akun.

    Faktor Motivasi Hack Akun TikTok Rasa Ingin Tahu: Banyak remaja mencoba aktivitas ini untuk tujuan eksplorasi. Tekanan Sosial: Pengaruh dari teman sebaya atau komunitas daring.

    Dampak Aktivitas Hack TikTok Korban: Kehilangan akses ke akun, dan trauma psikologis.

    Rekomendasi Peningkatan Literasi Digital: Mengintegrasikan program literasi digital di sekolah dan komunitas. Penguatan Regulasi: Pemerintah dan platform media sosial perlu meningkatkan pengawasan terhadap aplikasi hack TikTok.

    Kesimpulan Penelitian ini mengungkapkan bahwa aktivitas peretasan akun TikTok di kalangan remaja disebabkan oleh kombinasi faktor teknis dan sosial.

  7. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
haveibeenpwned.com (2018). "Pwned Passwords" Dataset [Dataset]. https://academictorrents.com/details/53555c69e3799d876159d7290ea60e56b35e36a9
Organization logo

"Pwned Passwords" Dataset

Explore at:
bittorrent(11101449979)Available download formats
Dataset updated
Aug 3, 2018
Dataset provided by
Have I Been Pwned?http://haveibeenpwned.com/
License

https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

Description

Version 3 with 517M hashes and counts of password usage ordered by most to least prevalent Pwned Passwords are 517,238,891 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they re at much greater risk of being used to take over other accounts. They re searchable online below as well as being downloadable for use in other online system. The entire set of passwords is downloadable for free below with each password being represented as a SHA-1 hash to protect the original value (some passwords contain personally identifiable information) followed by a count of how many times that password had been seen in the source data breaches. The list may be integrated into other systems and used to verify whether a password has previously appeared in a data breach after which a system may warn the user or even block the password outright.

Search
Clear search
Close search
Google apps
Main menu