: IT professionals use it to identify weak passwords within their organization.
: Typically formatted as a plain-text file with one entry per line, making it easy to parse with scripts or standard command-line tools.
: Includes typical password patterns like character substitutions (e.g., replacing 'a' with '@'), numeric suffixes, and common character sequences (e.g., "123456", "qwerty"). Common Applications