18th century writer Samuel Johnson once said, “When a man is tired of London, he is tired of life; for there is in London all that life can afford.”
Much has changed in London since the 18th century, but the sentiment of Johnson’s statement is perhaps more apt than ever. London has developed into one of the most exciting and vibrant cities in the world. It’s steeped in history, diversity and regardless of where your passions and interests lie, you’ll find an outlet for them in this wonderful city. If you’re preparing to live in London, here’s a little teaser of what’s in store and what to look forward to as a new Londoner.
Brute-forcing passwords that aren't in standard dictionaries but follow human patterns (e.g., "Password123!"). How to Use a Wordlist Effectively
Ethical hackers use them to demonstrate how quickly a weak password can be bypassed.
In the world of cybersecurity, whether you are a professional penetration tester or a developer hardening your own application, you eventually run into the concept of a .
Developers who want to block users from choosing compromised passwords. Where to find it: Have I Been Pwned Downloads. 4. Probable-Grahams
Known as the world’s fastest password cracker, it leverages GPU power to fly through wordlists at incredible speeds. Pro Tip: Using "Rules"
A is a fundamental tool in any security toolkit. By understanding the most common patterns used by humans, we can build more resilient systems that protect against the most basic—yet most effective—form of cyberattack.
If you only download one thing, make it . This is a massive collection of multiple types of lists used during security assessments.
The Ultimate Guide to Common Password Wordlists: Why They Matter and Where to Find Them
Brute-forcing passwords that aren't in standard dictionaries but follow human patterns (e.g., "Password123!"). How to Use a Wordlist Effectively
Ethical hackers use them to demonstrate how quickly a weak password can be bypassed.
In the world of cybersecurity, whether you are a professional penetration tester or a developer hardening your own application, you eventually run into the concept of a .
Developers who want to block users from choosing compromised passwords. Where to find it: Have I Been Pwned Downloads. 4. Probable-Grahams
Known as the world’s fastest password cracker, it leverages GPU power to fly through wordlists at incredible speeds. Pro Tip: Using "Rules"
A is a fundamental tool in any security toolkit. By understanding the most common patterns used by humans, we can build more resilient systems that protect against the most basic—yet most effective—form of cyberattack.
If you only download one thing, make it . This is a massive collection of multiple types of lists used during security assessments.
The Ultimate Guide to Common Password Wordlists: Why They Matter and Where to Find Them
Copyright © 2026 Le Cordon Bleu International B.V. All Rights Reserved.