Skip to main content

One place for all the default credentials to assist pentesters during an engagement, this document has several products default login/password gathered from multiple sources.

Project description

Default Credentials Cheat Sheet

One place for all the default credentials to assist pentesters/blue Teamers during engagements, featuring default login/password details for various products sourced from multiple references.

P.S : Most of the credentials were extracted from changeme,routersploit and Seclists projects, you can use these tools to automate the process https://github.com/ztgrace/changeme , https://github.com/threat9/routersploit (kudos for the awesome work)

Installation & Usage

$ pip3 install defaultcreds-cheat-sheet
$ creds search tomcat
Operating System Tested
Linux(Kali,Ubuntu,Lubuntu) ✔️
Windows ✔️
macOS ✔️

Creds script

Usage Guide

# Search for product creds creds search tomcat                                                                                                      
+----------------------------------+------------+------------+
| Product                          |  username  |  password  |
+----------------------------------+------------+------------+
| apache tomcat (web)              |   tomcat   |   tomcat   |
| apache tomcat (web)              |   admin    |   admin    |
...
+----------------------------------+------------+------------+

# Update records creds update
Check for new updates...🔍
New updates are available 🚧
[+] Download database...

# Export Creds to files (could be used for brute force attacks) creds search tomcat export
+----------------------------------+------------+------------+
| Product                          |  username  |  password  |
+----------------------------------+------------+------------+
| apache tomcat (web)              |   tomcat   |   tomcat   |
| apache tomcat (web)              |   admin    |   admin    |
...
+----------------------------------+------------+------------+

[+] Creds saved to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt 📥

Run creds through proxy

# Search for product creds creds search tomcat --proxy=http://localhost:8080

# update records creds update --proxy=http://localhost:8080

# Search for Tomcat creds and export results to /tmp/tomcat-usernames.txt , /tmp/tomcat-passwords.txt creds search tomcat --proxy=http://localhost:8080 export

Contribute

If you cannot find the password for a specific product, please submit a pull request to update the dataset.

Disclaimer

For educational purposes only, use it at your own responsibility.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

defaultcreds_cheat_sheet-0.5.3.0.tar.gz (46.9 kB view details)

Uploaded Source

Built Distribution

File details

Details for the file defaultcreds_cheat_sheet-0.5.3.0.tar.gz.

File metadata

  • Download URL: defaultcreds_cheat_sheet-0.5.3.0.tar.gz
  • Upload date:
  • Size: 46.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/2.0.1 CPython/3.13.2 Linux/6.12.13-amd64

File hashes

Hashes for defaultcreds_cheat_sheet-0.5.3.0.tar.gz
Algorithm Hash digest
SHA256 8162486fdf31af7aa8cac0bca49904c0d672b0149a504d3fec73e90fa2062719
MD5 dc9e2cb1c39d4a3eb658b270a594a0dd
BLAKE2b-256 f3c6ef25beca151dac84e9990825fdc82a5c8af58866fbf05eac15b479667421

See more details on using hashes here.

File details

Details for the file defaultcreds_cheat_sheet-0.5.3.0-py3-none-any.whl.

File metadata

File hashes

Hashes for defaultcreds_cheat_sheet-0.5.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 b61051a9b08c80ce3e20fee79791c64c4ae9631ba07acc34e243fe17883209b0
MD5 42d5dd9f6c95e14d7eea5185f612dfdd
BLAKE2b-256 7cabe4b473c763602debe015d624696ae1fcf40504f4df2ed51b1cf5d1377089

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page