Nerdy leaked passwords:

Treebeard - “This password has been seen 1,207 times before in data breaches!”

NedStark - 20 times

CerseiLannister - 30 times

youknownothingjonsnow - 61 times

PicardIsSexy - 0 times (!The_Picard_Maneuver@piefed.world you’re safe. ;)

edit:

Gandalf1 - 53,478

Gandalfthewhite - 51

sexygandalf - 6


NSFW leaked passwords:

spoiler

bigdick - 178,712 (!?!)

bigpussy - 9,226

longpussy - 26

longdick - 10,762

wetpussy - 61,575

wetdick - 579

twat - 6,588

dickhead - 201,942

Blueballs69 - 520


Weird leaked passwords:

BillClinton - 378

DonaldTrump123 - 792

youwillneverguessmypassword - 390

redgreenblue - 2,040

123qweasdzxc - 1,010,515

poopstick - 6,845

((More to come later))

  • Kazumara@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    4 days ago

    Alternatively just hash your password with SHA-1 or NTLM and put the first 5 character of the hash into this link: https://api.pwnedpasswords.com/range/{first-5-hash-chars} then check the results for the rest of the characters of your hash.

    Example flow:

    Your password: 1234
    Run echo -n "1234" | sha1sum | awk '{ print toupper($0) }' or some other method to locally generate the SHA-1 hash
    Resulting SHA-1 Hash: 7110EDA4D09E062AA5E4A390B0A572AC0D2C0220
    Split off 5: 7110E - DA4D09E062AA5E4A390B0A572AC0D2C0220
    Open Link https://api.pwnedpasswords.com/range/7110E
    Search for DA4D09E062AA5E4A390B0A572AC0D2C0220
    Find: DA4D09E062AA5E4A390B0A572AC0D2C0220:30272674
    So this password appears a bit over 30 million times in the breach data he has.

    All Troy gets from you, if you do this, is the first 5 characters of your hash, which is pretty useless.