[
  {
    "path": ".gitignore",
    "content": "# Byte-compiled / optimized / DLL files\n__pycache__/\n*.py[cod]\n*$py.class\n\n# C extensions\n*.so\n\n# Distribution / packaging\n.Python\nbuild/\ndevelop-eggs/\ndist/\ndownloads/\neggs/\n.eggs/\nlib/\nlib64/\nparts/\nsdist/\nvar/\nwheels/\npip-wheel-metadata/\nshare/python-wheels/\n*.egg-info/\n.installed.cfg\n*.egg\nMANIFEST\n\n# PyInstaller\n#  Usually these files are written by a python script from a template\n#  before PyInstaller builds the exe, so as to inject date/other infos into it.\n*.manifest\n*.spec\n\n# Installer logs\npip-log.txt\npip-delete-this-directory.txt\n\n# Unit test / coverage reports\nhtmlcov/\n.tox/\n.nox/\n.coverage\n.coverage.*\n.cache\nnosetests.xml\ncoverage.xml\n*.cover\n*.py,cover\n.hypothesis/\n.pytest_cache/\n\n# Translations\n*.mo\n*.pot\n\n# Django stuff:\n*.log\nlocal_settings.py\ndb.sqlite3\ndb.sqlite3-journal\n\n# Flask stuff:\ninstance/\n.webassets-cache\n\n# Scrapy stuff:\n.scrapy\n\n# Sphinx documentation\ndocs/_build/\n\n# PyBuilder\ntarget/\n\n# Jupyter Notebook\n.ipynb_checkpoints\n\n# IPython\nprofile_default/\nipython_config.py\n\n# pyenv\n.python-version\n\n# pipenv\n#   According to pypa/pipenv#598, it is recommended to include Pipfile.lock in version control.\n#   However, in case of collaboration, if having platform-specific dependencies or dependencies\n#   having no cross-platform support, pipenv may install dependencies that don't work, or not\n#   install all needed dependencies.\n#Pipfile.lock\n\n# PEP 582; used by e.g. github.com/David-OConnor/pyflow\n__pypackages__/\n\n# Celery stuff\ncelerybeat-schedule\ncelerybeat.pid\n\n# SageMath parsed files\n*.sage.py\n\n# Environments\n.env\n.venv\nenv/\nvenv/\nENV/\nenv.bak/\nvenv.bak/\n\n# Spyder project settings\n.spyderproject\n.spyproject\n\n# Rope project settings\n.ropeproject\n\n# mkdocs documentation\n/site\n\n# mypy\n.mypy_cache/\n.dmypy.json\ndmypy.json\n\n# Pyre type checker\n.pyre/\n"
  },
  {
    "path": "CONTRIBUTING.md",
    "content": "# CONTRIBUTING\n\nTotalPass was created by HJK [@0xHJK](https://github.com/0xHJK).\n\n项目主要参考或使用了以下项目，向其开发者表示感谢。\n- https://github.com/ztgrace/changeme\n- https://github.com/psf/requests\n- https://github.com/pallets/click\n- https://github.com/paramiko/paramiko\n- 其他引用的第三方库\n\n## Authors\n\n- [@0xHJK](https://github.com/0xHJK)\n\n## Development\n\n项目支持插件化开发，只需要在`addons`目录中添加插件，在`passwds`目录中添加密码信息即可使用\n\n### 添加yml密码（推荐）\n\n例如新增一个思科的snmp默认密码文件，可以在`passwds/snmp`目录下创建`cisco.yml`文件\n\n参考格式：\n\n```yml\nname: Cisco - NETRANGER/SECURE IDS # 名称中可以包含服务商、型号、版本等信息，是唯一识别符\nvendor: CISCO\nauth:\n  credentials:\n  - username: cisco\n    password: cisco\n  - username: 用户名和密码可以创建多对\n    password: 用户名和密码可以创建多对\ncategory: snmp # 类别必须和插件名称一致\nport: 161\ncomment: 这是备注，可以备注来源链接\n```\n\n### 添加csv密码\n\n如果需要添加多个密码，可以使用csv文件\n\ncsv格式：username, password [, name, category, port, comment]\n\n用户名和密码必须，配置名称、扫描类型、端口、备注可选\n\n### 开发扫描器插件\n\n如果扫描类型不在已支持的插件中，可以选择自行开发插件。\n\n开发插件需要在`addons`目录中创建py文件，文件名为扫描类型，如`mongo.py`。\n\n同时需要在`payloads`目录中添加对应的密码信息。\n\n格式参考：\n```python\n\n# 引入必要的包\nimport pymongo\nfrom ..settings import opts\nfrom ..scanner import Scanner\n\n# 继承Scanner类，类名和扫描类别保持一致\nclass MongoScanner(Scanner):\n    def __init__(self, passwd, target, username, password):\n        super(RedisScanner, self).__init__(passwd, target, username, password)\n        # 指定默认端口\n        self.port = self.port or 27017\n\n    # 核心扫描方法，成功通常返回服务信息，失败返回False\n    def _check(self):\n        evidence = \"mongodb version xxx\"\n        return evidence\n\n# 被调用的生成扫描器的方法，注意类名一致\ndef mkscanner(passwd, target, username, password):\n    return MongoScanner(passwd, target, username, password)\n\n```\n"
  },
  {
    "path": "HISTORY.md",
    "content": "# HISTORY\n\n- 2020-04\n  - 完成项目基本结构\n  - 完成 SSH 扫描器\n  - 完成 Telnet 扫描器\n  - 完成 Redis 扫描器\n  - 完成 SNMP 扫描器\n- 2020-03\n  - 项目开始，计划完成一个默认密码扫描工具"
  },
  {
    "path": "LICENSE",
    "content": "MIT License\n\nCopyright (c) 2020 HJK\n\nPermission is hereby granted, free of charge, to any person obtaining a copy\nof this software and associated documentation files (the \"Software\"), to deal\nin the Software without restriction, including without limitation the rights\nto use, copy, modify, merge, publish, distribute, sublicense, and/or sell\ncopies of the Software, and to permit persons to whom the Software is\nfurnished to do so, subject to the following conditions:\n\nThe above copyright notice and this permission notice shall be included in all\ncopies or substantial portions of the Software.\n\nTHE SOFTWARE IS PROVIDED \"AS IS\", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR\nIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,\nFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE\nAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER\nLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,\nOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE\nSOFTWARE.\n"
  },
  {
    "path": "MANIFEST.in",
    "content": "include \\\n    LICENSE \\\n    MAINFEST.in \\\n    *.md \\\n    setup.* \\\n    totalpass.jpg\n\nrecursive-include totalpass *.yml *.csv\n\nexclude \\\n    .env* \\\n    .git*\n\nprune build\nprune dist\n"
  },
  {
    "path": "Makefile",
    "content": ".PHONY: test\n\ndev:\n\tpip install setuptools pytest black twine flake8\n\nci:\n\tpy.test --junitxml=report.xml\n\ntest:\n\tpython3 setup.py test\n\tpytest\n\ncoverage:\n\tpy.test --cov-config .coveragerc --verbose --cov-report term --cov-report xml --cov=totalpass --junitxml=report.xml tests\n\nflake8:\n\tblack .\n\tflake8 --ignore=E501,F401,W503 totalpass\n\nclean:\n\trm -fr build dist .egg totalpass.egg-info\n\trm -fr *.mp3 .pytest_cache coverage.xml report.xml htmlcov\n\tfind . | grep __pycache__ | xargs rm -fr\n\tfind . | grep .pyc | xargs rm -f\n\nuninstall:\n\tpip uninstall -y totalpass\n\ninstall:\n\tpython3 setup.py install\n\nbuild:\n\tpython3 setup.py sdist bdist_wheel\n\npublish:\n\tpython3 setup.py sdist bdist_wheel\n\ttwine upload dist/*\n"
  },
  {
    "path": "README.md",
    "content": "# TotalPass\n\n<p align=\"center\">\n  <a href=\"https://github.com/0xHJK/TotalPass\">\n    <img src=\"https://github.com/0xHJK/TotalPass/raw/master/totalpass.jpg\" alt=\"totalpass\">\n  </a>\n  <span>TotalPass 是一款默认口令/弱口令扫描工具</span><br>\n<p>\n\n<p align=\"center\">\n  <a><img src=\"https://img.shields.io/pypi/pyversions/TotalPass.svg\"></a>\n  <a href=\"https://github.com/0xHJK/TotalPass/releases\">\n    <img src=\"https://img.shields.io/github/v/release/0xHJK/TotalPass?include_prereleases\">\n  </a>\n  <a><img src=\"https://img.shields.io/github/license/0xHJK/TotalPass\"></a>\n</p>\n\n<p align=\"center\">\n  <a href=\"https://github.com/0xHJK/TotalPass\">https://github.com/0xHJK/TotalPass</a>\n</p>\n\n<hr>\n\n> ⚠️ **警告：本工具仅用于授权测试，不得用于非法用途，否则后果自负！**\n> \n> ⚠️ **WARNING：FOR LEGAL PURPOSES ONLY!**\n\n\n## 🤘 Features\n\n1. 扫描目标设备是否存在默认密码\n2. 搜索常见设备默认密码\n3. 支持手动和自动更新密码库\n\n目前支持的默认密码扫描类型有\n- SSH\n- Telnet\n- SNMP\n- Redis\n\n## 🚀 QuickStart\n\n```bash\n$ pip3 install totalpass\n$ totalpass scan 192.168.1.1\n```\n\n手动安装\n```bash\n$ git clone https://github.com/0xHJK/TotalPass\n$ cd TotalPass\n$ python3 setup.py install\n```\n\n## 💫 Usage\n\n查看帮助\n\n```bash\n$ totalpass --help\nUsage: totalpass.py [OPTIONS] COMMAND [ARGS]...\n\nOptions:\n  --version  Show the version and exit.\n  --help     Show this message and exit.\n\nCommands:\n  list    列出所有支持的设备信息和服务类型\n  scan    指定目标进行密码扫描\n  search  从密码库中搜索密码\n  update  从 cirt.net 更新密码库\n```\n\n查看扫描命令帮助\n```bash\n$ totalpass scan --help\nUsage: totalpass.py scan [OPTIONS] TARGET...\n\n  指定目标进行密码扫描\n\nOptions:\n  -x, --name TEXT        指定设备型号或品牌\n  -c, --category TEXT    指定扫描类型\n  -p, --port INTEGER     指定扫描端口\n  -d, --dirname TEXT     指定字典目录或文件\n  --common               使用常见弱口令字典\n  -t, --threads INTEGER  指定线程数量\n  -v, --verbose          详细输出模式\n  --help                 Show this message and exit.\n```\n\n## 🤖 Scanner\n\n对单一IP进行所有扫描\n```bash\n$ totalpass scan 192.168.1.1\n```\n\n使用详细模式\n```bash\n$ totalpass scan -v 192.168.1.1\n```\n\n指定扫描类型进行扫描\n```bash\n$ totalpass scan -c ssh 192.168.1.1\n```\n\n指定端口进行扫描\n```bash\n$ totalpass scan -p 22 192.168.1.1\n```\n\n自定义字典进行扫描\n```bash\n$ totalpass scan -d your-wordlist 192.168.1.1\n```\n\n对多个IP进行扫描（速度较慢）\n```bash\n$ totalpass scan 192.168.1.1 192.168.1.2\n\n$ totalpass scan 192.168.1.1/24\n```\n\n## 🔑 Passwords\n\n查看支持的扫描类型\n```bash\n$ totalpass list\n```\n\n在密码库中搜索密码\n```bash\n$ totalpass search weblogic\n```\n\n在密码库中搜索密码（以表格形式显示）\n```bash\n$ totalpass search -v tomcat\n```\n\n在密码库中搜索密码（以完整形式显示）\n```bash\n$ totalpass search -vv tomcat\n```\n\n多个条件搜索\n```bash\n$ totalpass search oracle unix\n```\n\n更新密码库\n```bash\n$ totalpass update\n```\n\n## 🧩 Options\n\n### 扫描目标\n\n扫描目标支持单个IP、多个IP、子网、指定类型和端口等形式\n```bash\n$ totalpass scan 192.168.1.1\n\n$ totalpass scan 192.168.1.1 192.168.1.2\n\n$ totalpass scan 192.168.1.1/24\n\n$ totalpass scan redis://192.168.1.1:6379\n```\n\n### 设备类型或名称\n\n参数：`-x`或`--name=`\n\n对应payloads目录中的yml文件的name属性\n\n### 扫描类型\n\n参数：`-c`或`--category=`\n\n对应payloads目录中的yml文件的category属性，也和`addons`目录中的插件名称对应，如果不指定则默认使用所有插件。\n\n支持多种类型，如`-c ssh -c telnet`\n\n### 扫描端口\n\n参数：`-p`或`--port=`\n\n不指定则使用默认端口\n\n### 线程数量\n\n参数：`-t`或`--threads=`\n\n默认10线程\n\n### 常见弱口令\n\n参数：`--common`\n\n在匹配的yml文件之外，使用csv文件中常见弱口令进行爆破\n\n### 自定义字典\n\n参数：`-d`或`--dirname=`\n\n可以指定字典目录或字典文件\n\n### 详细模式\n\n参数：`-v` `-vv` `-vvv`\n\n`v`越多，输出越详细\n\n\n## 📜 History\n\n<https://github.com/0xHJK/TotalPass/blob/master/HISTORY.md>\n\n## 🤝 Contributing\n\n<https://github.com/0xHJK/TotalPass/blob/master/CONTRIBUTING.md>\n\n## 📄 License\n\n[MIT License](https://github.com/0xHJK/TotalPass/blob/master/LICENSE)\n\n## ❤️ Donate\n\nBTC：bc1qn hvev dghq uzc3 fh9c qdja 63ut qqgn va3l h6n2s\n\nWechat：\n\n![Wechat](https://github.com/0xHJK/music-dl/raw/master/static/wepay.jpg)\n"
  },
  {
    "path": "requirements.txt",
    "content": "redis\npysnmp\nnetaddr\nclick\npyyaml\nparamiko\nrequests\n"
  },
  {
    "path": "setup.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\nimport os\nimport setuptools\nfrom os import path\n\n\nproj_dir = path.dirname(path.realpath(__file__))\nabout_file = path.join(proj_dir, \"totalpass\", \"__version__.py\")\n\nabout = {}\nexec(open(about_file, \"r\", encoding=\"utf-8\").read(), about)\n\nlong_description = open(\"README.md\", \"r\", encoding=\"utf-8\").read()\n\nrequirements = open(\"requirements.txt\", \"r\", encoding=\"utf-8\").read().splitlines()\n\n\nsetuptools.setup(\n    name=about[\"__title__\"],\n    version=about[\"__version__\"],\n    description=about[\"__description__\"],\n    author=about[\"__author__\"],\n    author_email=about[\"__author_email__\"],\n    url=about[\"__url__\"],\n    license=about[\"__license__\"],\n    long_description=long_description,\n    long_description_content_type=\"text/markdown\",\n    packages=setuptools.find_packages(),\n    include_package_data=True,\n    test_suite=\"tests\",\n    entry_points={\"console_scripts\": [\"totalpass = totalpass.__main__:main\"]},\n    install_requires=requirements,\n    classifiers=[\n        \"Development Status :: 4 - Beta\",\n        \"Environment :: Console\",\n        \"Intended Audience :: Developers\",\n        \"Intended Audience :: End Users/Desktop\",\n        \"License :: OSI Approved :: MIT License\",\n        \"Operating System :: OS Independent\",\n        \"Programming Language :: Python\",\n        \"Programming Language :: Python :: 3\",\n        \"Programming Language :: Python :: 3 :: Only\",\n        \"Programming Language :: Python :: 3.7\",\n        \"Programming Language :: Python :: 3.8\",\n        \"Topic :: Security\",\n        \"Topic :: Security :: Cryptography\",\n        \"Topic :: Internet\",\n        \"Topic :: System\",\n        \"Topic :: Database\",\n        \"Topic :: Utilities\",\n    ],\n)\n"
  },
  {
    "path": "tests/__init__.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n"
  },
  {
    "path": "tests/test_main.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\nimport totalpwd\n\n\ndef test_main():\n    assert totalpwd.main() == \"TotalPwd\"\n"
  },
  {
    "path": "totalpass/__init__.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\nfrom .__version__ import __version__\nfrom .__main__ import main\n"
  },
  {
    "path": "totalpass/__main__.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\nimport os\nimport sys\nimport logging\nimport click\nfrom prettytable import PrettyTable\nfrom .core import TPCore\nfrom .passwd import Passwd\nfrom .target import Target\nfrom .settings import opts\nfrom .__version__ import __version__\n\n\ndef banner():\n    return (\n        \"\\nTotalPass %s created by HJK.\\nhttps://github.com/0xHJK/TotalPass\\n\"\n        % __version__\n    )\n\n\n@click.group()\n@click.version_option(message=banner())\ndef main():\n    print(banner())\n\n\n@main.command()\ndef list():\n    \"\"\" 列出所有支持的设备信息和服务类型 \"\"\"\n    TPCore.anylist()\n\n\n@main.command()\ndef update():\n    \"\"\" 从 cirt.net 更新密码库\"\"\"\n    TPCore.anyupdate()\n\n\n@main.command()\n@click.argument(\"keywords\", nargs=-1, required=True)\n@click.option(\"-v\", \"--verbose\", count=True, help=\"详细输出模式\")\ndef search(keywords, verbose):\n    \"\"\" 从密码库中搜索密码 \"\"\"\n    TPCore.anysearch(keywords, verbose)\n\n\n@main.command()\n@click.argument(\"target\", nargs=-1, required=True)\n@click.option(\"-x\", \"--name\", help=\"指定设备型号或品牌\")\n@click.option(\"-c\", \"--category\", multiple=True, help=\"指定扫描类型\")\n@click.option(\"-p\", \"--port\", type=int, help=\"指定扫描端口\")\n@click.option(\"-d\", \"--dirname\", help=\"指定字典目录或文件\")\n@click.option(\"--common\", is_flag=True, default=False, help=\"使用常见弱口令字典\")\n@click.option(\"-t\", \"--threads\", default=10, type=int, help=\"指定线程数量\")\n@click.option(\"-v\", \"--verbose\", count=True, help=\"详细输出模式\")\ndef scan(target, name, common, category, port, dirname, threads, verbose):\n    \"\"\" 指定目标进行密码扫描 \"\"\"\n\n    if verbose < 1:\n        level = logging.WARNING\n    elif verbose < 2:\n        level = logging.INFO\n    else:\n        level = logging.DEBUG\n    logging.basicConfig(\n        level=level,\n        format=\"[%(asctime)s] %(levelname)-8s | %(msg)s \",\n        datefmt=\"%H:%M:%S\",\n    )\n\n    opts.threads = threads\n\n    if name:\n        opts.name = name\n\n    if common:\n        opts.common = \"common\"\n\n    if category:\n        opts.categories = category\n    else:\n        from . import addons\n\n        opts.categories = addons.__all__\n\n    opts.port = port\n\n    if dirname and os.path.exists(dirname):\n        opts.passwds_path = dirname\n    # passwds会影响categories，所以必须先load passwds\n    opts.passwds = Passwd.load()\n    opts.targets = Target.parse(target)\n\n    opts.running = True\n    \n    try:\n        TPCore.anyscan()\n    except KeyboardInterrupt as e:\n        opts.running = False\n        click.echo(\"Exit.\")\n        sys.exit()\n    finally:\n        click.echo(\"\\n--- Result -------------\")\n        if not opts.result:\n            click.secho(\"[x] Not Found\", fg=\"red\")\n        else:\n            for msg in opts.result:\n                click.secho(msg, fg=\"green\")\n        click.echo(\"------------------------\\n\")\n\n\nif __name__ == \"__main__\":\n    main()\n"
  },
  {
    "path": "totalpass/__version__.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\n__title__ = \"TotalPass\"\n__description__ = \"Defualt password scanner and searcher\"\n__url__ = \"https://github.com/0xHJK/TotalPass\"\n__version__ = \"0.0.2\"\n__author__ = \"HJK\"\n__author_email__ = \"HJKdev@gmail.com\"\n__license__ = \"MIT License\"\n__copyright__ = \"Copyright 2020 HJK\"\n"
  },
  {
    "path": "totalpass/addons/__init__.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\nfrom os.path import dirname, basename, isfile, join\nimport glob\n\nmodules = glob.glob(join(dirname(__file__), \"*.py\"))\n__all__ = [\n    basename(f)[:-3] for f in modules if isfile(f) and not f.endswith(\"__init__.py\")\n]\n\nfrom . import *\n"
  },
  {
    "path": "totalpass/addons/redis.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    Redis 密码扫描器\n\"\"\"\n\nimport redis\nfrom ..settings import opts\nfrom ..scanner import Scanner\n\n\nclass RedisScanner(Scanner):\n    \"\"\"\n        Redis 密码扫描器\n    \"\"\"\n\n    def __init__(self, passwd, target, username, password):\n        super(RedisScanner, self).__init__(passwd, target, username, password)\n        self.port = self.port or 6379\n\n    def _check(self):\n        r = redis.StrictRedis(host=self.host, port=self.port)\n        info = r.info()\n        evidence = \"redis_version: %s, os: %s\" % (info[\"redis_version\"], info[\"os\"])\n        return evidence\n\n\ndef mkscanner(passwd, target, username, password):\n    return RedisScanner(passwd, target, username, password)\n"
  },
  {
    "path": "totalpass/addons/snmp.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    SNMP 扫描器\n\"\"\"\n\nfrom pysnmp.hlapi import *\nfrom ..scanner import Scanner\nfrom ..settings import opts\n\n\nclass SNMPScanner(Scanner):\n    \"\"\"\n        SNMP 扫描器\n    \"\"\"\n\n    def __init__(self, passwd, target, username, password):\n        super(SNMPScanner, self).__init__(passwd, target, username, password)\n        self.port = self.port or 161\n\n    def _check(self):\n        iterator = getCmd(\n            SnmpEngine(),\n            CommunityData(self.password),\n            UdpTransportTarget((str(self.host), self.port)),\n            ContextData(),\n            ObjectType(ObjectIdentity(\"SNMPv2-MIB\", \"sysDescr\", 0)),\n        )\n\n        errorIndication, errorStatus, errorIndex, varBinds = next(iterator)\n\n        evidence = \"\"\n        if errorIndication:\n            self.logger.debug(errorIndication)\n        elif errorStatus:\n            self.logger.debug(\n                \"%s at %s\"\n                % (\n                    errorStatus.prettyPrint(),\n                    errorIndex and varBinds[int(errorIndex) - 1][0] or \"?\",\n                )\n            )\n        else:\n            for varBind in varBinds:\n                evidence += \" = \".join([x.prettyPrint() for x in varBind])\n\n        return evidence\n\n\ndef mkscanner(passwd, target, username, password):\n    return SNMPScanner(passwd, target, username, password)\n"
  },
  {
    "path": "totalpass/addons/ssh.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    SSH 扫描器\n\"\"\"\n\nimport logging\nimport paramiko\nfrom ..scanner import Scanner\nfrom ..settings import opts\n\n\nclass SSHScanner(Scanner):\n    \"\"\"\n        SSH 扫描器\n    \"\"\"\n\n    def __init__(self, passwd, target, username, password):\n        super(SSHScanner, self).__init__(passwd, target, username, password)\n        self.port = self.port or 22\n\n    def _check(self):\n        c = paramiko.SSHClient()\n        c.set_missing_host_key_policy(\n            paramiko.MissingHostKeyPolicy()\n        )  # ignore unknown hosts\n        c.connect(\n            hostname=self.host,\n            port=self.port,\n            username=self.username,\n            password=self.password,\n            timeout=opts.timeout,\n            banner_timeout=300,\n            auth_timeout=20,\n        )\n        stdin, stdout, stderr = c.exec_command(\"uname -a\")\n        evidence = stdout.readlines()[0]\n        c.close()\n        return evidence\n\n\ndef mkscanner(passwd, target, username, password):\n    return SSHScanner(passwd, target, username, password)\n"
  },
  {
    "path": "totalpass/addons/telnet.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    Telnet 扫描器\n\"\"\"\n\nimport socket\nimport time\nimport logging\nfrom telnetlib import Telnet\nfrom ..scanner import Scanner\nfrom ..settings import opts\n\n\nclass TelnetScanner(Scanner):\n    \"\"\"\n        Telnet 扫描器\n    \"\"\"\n\n    def __init__(self, passwd, target, username, password):\n        super(TelnetScanner, self).__init__(passwd, target, username, password)\n        self.port = self.port or 23\n\n    def _check(self):\n        tn = Telnet(host=self.host, port=self.port, timeout=opts.timeout)\n        self._command(tn, \"login: \", self.username)\n        self._command(tn, \"Password: \", self.password or \"\")\n        evidence = self._command(tn, \"$\", \"\").strip()\n        # TODO: 有些系统不一定是$符号\n        if not evidence.endswith(\"$\"):\n            # if not evidence or evidence.endswith(\"login:\"):\n            evidence = False\n        tn.close()\n        return evidence\n\n    def _command(self, tn, flag, cmd):\n        data = tn.read_until(flag.encode(), timeout=opts.timeout / 2)\n        tn.write(cmd.encode() + b\"\\n\")\n        return data.decode(errors=\"ignore\")\n\n\ndef mkscanner(passwd, target, username, password):\n    return TelnetScanner(passwd, target, username, password)\n"
  },
  {
    "path": "totalpass/cirt.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    https://cirt.net/passwords 爬虫\n    更新默认密码信息\n\"\"\"\n\nimport os\nimport re\nimport copy\nimport logging\nimport requests\nimport click\nimport yaml\nfrom os import path\nfrom threading import Thread\nfrom queue import Queue\nfrom .settings import opts\nfrom .passwd import Passwd\nfrom pyquery import PyQuery as pq\n\n\nclass CirtPass(object):\n    \"\"\"\n        cirt.net 密码爬虫\n    \"\"\"\n\n    logger = logging.getLogger(\"TotalPass\")\n    key_map = {\"User ID\": \"username\", \"Password\": \"password\", \"Method\": \"category\"}\n\n    qt = Queue()\n\n    def __init__(self):\n        pass\n\n    @classmethod\n    def mkdir(cls, dirname):\n        if path.exists(dirname):\n            if not path.isdir(dirname):\n                # 如果存在但不是文件夹则删除再创建\n                os.remove(dirname)\n                os.makedirs(dirname)\n        else:\n            os.makedirs(dirname)\n\n    @classmethod\n    def update(cls):\n        \"\"\"\n            更新密码\n        \"\"\"\n        cirt_path = path.join(opts.passwds_path, \"cirt\")\n        cls.mkdir(cirt_path)\n        # 获取不同厂商的密码链接\n        ven_urls = cls.geturls(\"https://cirt.net/passwords\")\n\n        for vendor, url in ven_urls:\n            if vendor:\n                cls.qt.put((vendor, url))\n\n        for i in range(opts.threads):\n            t = Thread(target=cls.fetchpasswds, args=(cirt_path,))\n            t.start()\n\n        cls.qt.join()\n\n    @classmethod\n    def geturls(cls, url) -> list:\n        ven_urls = []  # (name, url)\n        try:\n            d = pq(cls.fetch(url))\n            for td_a in d(\"td a\"):\n                ad = pq(td_a)\n                vendor, link = ad.text(), ad.attr(\"href\")\n                if vendor:\n                    link = url + link\n                    ven_urls.append((vendor, link))\n        except Exception as e:\n            click.secho(\"[x] fetch url %s failed.\" % url, fg=\"red\")\n            cls.logger.error(\"%s Exception: %s\" % (type(e).__name__, str(e)))\n        return ven_urls\n\n    @classmethod\n    def fetchpasswds(cls, cirt_path):\n        \"\"\"\n            从URL获得数据并分析得到passwd保存到文件\n        \"\"\"\n        while not cls.qt.empty():\n            vendor, url = cls.qt.get()\n            # 创建文件夹\n            ven_dir = path.join(cirt_path, vendor.lower())\n            ven_dir = re.sub(\"[\\.\\,]\", \"\", ven_dir)\n            ven_dir = re.sub(\"[\\|\\*\\&\\^@]\", \"-\", ven_dir)\n\n            cls.mkdir(ven_dir)\n\n            passwds_map = {}\n            try:\n                # 从URL获得数据\n                d = pq(cls.fetch(url))\n                for tb in d(\"table\"):\n                    d_tb = pq(tb)\n                    model = pq(d_tb(\"h3 i\")).text()\n                    title = model\n                    count = len(d_tb(\"td\"))\n                    table = {\"title\": title, \"comment\": \"\"}  # 把cirt的表格格式化成一个字典\n                    for i in range(1, count, 2):  # 从第二个td开始，第一个td是title\n                        key = pq(d_tb(\"td\")[i]).text()\n                        val = pq(d_tb(\"td\")[i + 1]).text()\n                        if not val:\n                            continue\n                        if key in cls.key_map:\n                            table[cls.key_map[key]] = (\n                                val.strip() if val != \"(none)\" else \"\"\n                            )\n                        else:\n                            table[\"comment\"] += \"%s: %s; \" % (key, val)\n\n                    # 拆分类别字段\n                    categories = table.get(\"category\", \"\").lower()\n                    if not categories:\n                        categories = [\"unknown\"]\n                    elif \",\" in categories:\n                        categories = categories.split(\",\")\n                    elif \"/\" in categories:\n                        categories = categories.split(\"/\")\n                    else:\n                        categories = [categories]\n\n                    for cat in categories:\n                        cat = cat.strip()\n                        new_table = copy.deepcopy(table)\n                        new_table[\"category\"] = cat\n                        passwd = passwds_map.get(new_table[\"title\"], None)\n                        cred = dict(\n                            username=new_table.get(\"username\", \"\"),\n                            password=new_table.get(\"password\", \"\"),\n                        )\n                        if passwd:\n                            if passwd.category == cat:\n                                # 如果passwd已存在并且分类相同则只添加密码\n                                passwd.credentials.append(cred)\n                                continue\n                            else:\n                                # 如果分类不同也需要创建新的\n                                title = model + \" - \" + cat\n                        # 如果passwd不存在则创建一个\n                        passwd = Passwd(\n                            vendor=vendor,\n                            name=vendor + \" - \" + title,\n                            category=cat,\n                            credentials=[cred],\n                            port=0,\n                            comment=new_table.get(\"comment\", \"\"),\n                        )\n                        passwd.title = title\n                        passwds_map[title] = passwd\n\n                # 保存获取到的数据\n                for title, passwd in passwds_map.items():\n                    fname = re.sub(\"[~`!@#\\$%\\^&\\*\\/\\?\\:\\|]\", \"-\", title)\n                    fullname = path.join(ven_dir, fname + \".yml\")\n                    with open(fullname, \"w\") as f:\n                        f.write(passwd.yaml())\n                    click.echo(\"Saved to %s.\" % fullname)\n\n                cls.qt.task_done()\n\n            except Exception as e:\n                click.secho(\"[x] fetch passwds %s failed.\" % url, fg=\"red\")\n                cls.logger.error(\"%s Exception: %s\" % (type(e).__name__, str(e)))\n\n    @classmethod\n    def fetch(cls, url):\n        cls.logger.info(\"Fetching %s...\" % url)\n        s = requests.Session()\n        r = s.get(url)\n        return r.text\n"
  },
  {
    "path": "totalpass/core.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    核心控制器\n    1. 解析命令\n    2. 调用对应插件\n    3. 返回结果\n\"\"\"\n\nimport sys\nimport queue\nimport logging\nimport click\nfrom threading import Thread\nfrom prettytable import PrettyTable\nfrom . import addons\nfrom .settings import opts\nfrom .passwd import Passwd\n\n\nclass TPCore(object):\n    \"\"\"\n        核心控制器\n    \"\"\"\n\n    logger = logging.getLogger(\"TotalPass\")\n    _q_scanners = queue.Queue()\n\n    def __init__(self):\n        pass\n        # self.logger = logging.getLogger(\"TotalPass\")\n        # self._q_scanners = queue.Queue()\n\n    @classmethod\n    def anyscan(cls):\n        click.echo(\"Checking if the target ports are open...\")\n\n        scanners = []\n        for t in opts.targets:\n            if t.alive():\n                scanners += t.load_scanners()\n\n        click.echo(\"\\nLoaded %i credential profiles.\" % len(opts.passwds))\n        click.echo(\"Loaded %i unique scanners.\\n\" % len(scanners))\n\n        for s in scanners:\n            cls._q_scanners.put(s)\n\n        tasks = []\n        for i in range(opts.threads):\n            t = Thread(target=cls._scan_worker)\n            t.start()\n            tasks.append(t)\n\n        cls._q_scanners.join()\n        opts.running = False\n        for i in range(opts.threads):\n            cls._q_scanners.put(None)\n\n        for t in tasks:\n            t.join()\n\n    @classmethod\n    def _scan_worker(cls):\n        while opts.running and not cls._q_scanners.empty():\n            s = cls._q_scanners.get()\n            if s is None:\n                break\n            s.scan()\n            cls._q_scanners.task_done()\n\n    @classmethod\n    def anysearch(cls, keywords, verbose):\n        \"\"\" 从密码库中搜索密码 \"\"\"\n        click.echo(\"Searching passwords from profiles...\")\n        passwds = Passwd.load()\n\n        matched = []\n        click.echo(\"[+] Loaded %s passwd profiles.\" % len(passwds))\n\n        if verbose < 1:\n            for passwd in passwds:\n                if passwd.match(keywords):\n                    matched += passwd.creds()\n            matched = set(matched)\n            print(\"\\n\")\n            for x in matched:\n                print(x)\n            print(\"\\n\")\n        elif verbose < 2:\n            for passwd in passwds:\n                if passwd.match(keywords):\n                    matched += passwd.cred_rows()\n            pt = PrettyTable([\"Username\", \"Password\", \"Name\"])\n            pt.align[\"Name\"] = \"l\"\n            for row in matched:\n                pt.add_row(row)\n            print(pt.get_string())\n        else:\n            for passwd in passwds:\n                if passwd.match(keywords):\n                    print(\"\\n-----------------------------\")\n                    print(passwd.yaml())\n                    matched.append(passwd.yaml())\n\n        if matched:\n            click.secho(\"[+] Found %s passwd.\" % len(matched), fg=\"green\")\n        else:\n            click.secho(\"[x] No matching passwd profile found.\", fg=\"red\")\n\n    @classmethod\n    def anyupdate(cls):\n        \"\"\" 从 cirt.net 更新密码库\"\"\"\n        click.echo(\"Updating passwords from cirt.net...\")\n        from .cirt import CirtPass\n\n        try:\n            CirtPass.update()\n            click.secho(\"[+] Passwords update completed.\", fg=\"green\")\n        except Exception as e:\n            click.secho(\"[x] Passwords update failed.\", fg=\"red\")\n            print(\"%s Exception: %s\" % (type(e).__name__, str(e)))\n\n    @classmethod\n    def anylist(cls):\n        \"\"\" 列出所有支持的设备信息和服务类型 \"\"\"\n        click.echo(\"Loading passwords from profiles...\")\n        pt = PrettyTable([\"Name\", \"Category\", \"Port\", \"Passwd Count\"])\n        pt.align[\"Name\"] = \"l\"\n        table = Passwd.table()\n        for row in table:\n            pt.add_row(row)\n        print(pt.get_string())\n        click.secho(\"[+] Loaded %s passwd profiles.\" % len(table), fg=\"green\")\n"
  },
  {
    "path": "totalpass/exceptions.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\nclass InvalidCredential(RuntimeError):\n    \"\"\" 帐号或密码错误 \"\"\"\n\n    def __init__(self, *args, **kwargs):\n        pass\n"
  },
  {
    "path": "totalpass/passwd.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    导入、解析和创建passwd\n\"\"\"\n\nimport os\nimport logging\nimport click\nimport yaml\nfrom .settings import opts\n\n\nclass Passwd(object):\n    logger = logging.getLogger(\"TotalPass\")\n\n    def __init__(\n        self,\n        name=\"\",\n        vendor=\"\",\n        category=\"\",\n        credentials=[],\n        port=0,\n        comment=\"\",\n        raw=None,\n    ):\n        # 唯一标识符（设备型号等信息）\n        self.name = name\n        self.vendor = vendor or name\n        self.category = category.lower()\n        self.credentials = credentials\n        self.port = int(port)\n        self.comment = comment\n        # 用来合并去重\n        self.key = \"%s-%s-%s\" % (self.name, self.category, self.port)\n        # 用来以后拓展\n        self.raw = raw\n\n    def __eq__(self, other):\n        return self.__dict__ == other.__dict__\n\n    def __hash__(self):\n        return hash(self.__repr__())\n\n    def __repr__(self):\n        return \"Name: %s, Category: %s, Port: %s\\nCredentials: %s\" % tuple(self.row())\n\n    def __str__(self):\n        return self.__repr__()\n\n    def row(self) -> list:\n        \"\"\"\n            返回passwd信息数组（表格中的一行）\n        \"\"\"\n        creds = [\n            (item.get(\"username\", \"\"), item.get(\"password\", \"\"))\n            for item in self.credentials\n        ]\n        return [self.name, self.category, self.port, str(creds)]\n\n    def creds(self) -> list:\n        \"\"\"\n            返回帐号和密码\n        \"\"\"\n        return [\n            \"%s,%s\" % (item.get(\"username\", \"\"), item.get(\"password\", \"\"))\n            for item in self.credentials\n        ]\n\n    def cred_rows(self) -> list:\n        \"\"\"\n            返回帐号、密码、名称\n        \"\"\"\n        return [\n            [item.get(\"username\", \"\"), item.get(\"password\", \"\"), self.name]\n            for item in self.credentials\n        ]\n\n    def yaml(self):\n        \"\"\"\n            把passwd信息格式化成yaml\n        \"\"\"\n        schema = {\n            \"name\": self.name,\n            \"vendor\": self.vendor,\n            \"category\": self.category,\n            \"auth\": {\"credentials\": self.credentials},\n            \"port\": int(self.port),\n            \"comment\": self.comment,\n        }\n        return yaml.dump(schema)\n\n    def match(self, keywords) -> bool:\n        \"\"\" 关键字匹配 passwd \"\"\"\n        s = str(self.yaml()).lower()\n        for kw in keywords:\n            if not kw in s:\n                return False\n        return True\n\n    @classmethod\n    def table(cls, passwds_path=\"\") -> list:\n        \"\"\"\n            返回passwd摘要信息\n            name, category, credentials count\n        \"\"\"\n        # 不可以直接在函数参数中设置，否则在调用之前就已经使用了旧的passwds_path\n        passwds_path = passwds_path or opts.passwds_path\n        passwds = cls.load(passwds_path)\n        return [\n            [passwd.name, passwd.category, passwd.port, len(passwd.credentials)]\n            for passwd in passwds\n        ]\n\n    @classmethod\n    def load(cls, passwds_path=\"\") -> list:\n        \"\"\"\n            导入passwd的对外接口\n        \"\"\"\n        passwds = []\n        passwds_path = passwds_path or opts.passwds_path\n        cls.logger.info(\"passwds_path: %s\" % passwds_path)\n        if os.path.isfile(passwds_path):\n            passwds = cls._load_file(passwds_path)\n        elif os.path.isdir(passwds_path):\n            passwds = cls._load_dir(passwds_path)\n        else:\n            cls.logger.critical(\"Invalid path.\")\n            return passwds\n        passwds = cls.merge(passwds)\n        return passwds\n\n    @classmethod\n    def merge(cls, passwds) -> list:\n        \"\"\"\n            如果命令行中指定了name参数，则需要去除不符合要求的密码对\n            TODO:合并passwds中的用户名和密码对\n        \"\"\"\n        names = []\n        if opts.name:\n            names.append(opts.name)\n        if opts.common:\n            names.append(\"COMMON\")\n        if not names:\n            # 如果没有指定name则直接返回\n            return passwds\n        # 否则需要去除不符合要求的passwds\n        ret_passwds = []\n        catgories = set()\n        for passwd in passwds:\n            for vn in names:\n                if vn.upper() in passwd.name.upper():\n                    ret_passwds.append(passwd)\n                    catgories.add(passwd.category)\n                    continue\n        # 对于分类也取并集\n        opts.categories = [cat for cat in opts.categories if cat in catgories]\n        return ret_passwds\n\n    @classmethod\n    def _load_dir(cls, dirname) -> list:\n        \"\"\"\n            遍历目录导入passwd\n        \"\"\"\n        passwds = []\n        cls.logger.info(\"Loading dir %s\" % dirname)\n        for root, dirs, files in os.walk(dirname):\n            for fname in files:\n                file = os.path.join(root, fname)\n                passwds += cls._load_file(file)\n        return passwds\n\n    @classmethod\n    def _load_file(cls, file) -> list:\n        \"\"\"\n            从文件导入passwd\n        \"\"\"\n        if file.endswith(\".yml\"):\n            return cls._load_yaml(file)\n        elif file.endswith(\".csv\"):\n            return cls._load_csv(file)\n        else:\n            cls.logger.debug(\"%s is not supported.\" % file)\n            return []\n\n    @classmethod\n    def _load_yaml(cls, file) -> list:\n        \"\"\"\n            导入yml文件中的passwd\n        \"\"\"\n        cls.logger.info(\"Loading yaml file %s\" % file)\n        passwds = []\n        try:\n            raw = open(file, \"r\").read()\n            parsed = yaml.safe_load(raw)\n            passwd = Passwd(\n                name=parsed[\"name\"],\n                vendor=parsed[\"vendor\"],\n                category=parsed[\"category\"],\n                credentials=parsed[\"auth\"][\"credentials\"],\n                port=parsed[\"port\"],\n                comment=parsed.get(\"comment\", \"\"),\n                raw=parsed,\n            )\n            passwds.append(passwd)\n        except Exception as e:\n            cls.logger.error(\"Parse yaml file %s failed.\" % file)\n            cls.logger.error(e)\n        return passwds\n\n    @classmethod\n    def _load_csv(cls, file) -> list:\n        \"\"\"\n            导入csv文件中的passwd\n            csv文件格式 username, password [, name, category, port, comment]\n        \"\"\"\n        cls.logger.info(\"Loading csv file %s\" % file)\n        passwds_map = {}\n        try:\n            with open(file, \"r\") as f:\n                for row in f.readlines():\n                    cells = [x.strip() for x in row.split(\",\")]\n                    padding = [None for i in range(6 - len(cells))]  # 补全长度\n                    full_cells = cells + padding\n\n                    name = full_cells[2] or \"COMMON\"\n                    category = full_cells[3] or full_cells[2] or \"common\"\n                    port = full_cells[4] or 0\n                    username, password = full_cells[0:2]\n\n                    key = \"%s-%s-%s\" % (name, category, port)\n                    cred = dict(username=username, password=password)\n                    if key in passwds_map:\n                        # 合并\n                        passwds_map.get(key).credentials.append(cred)\n                    else:\n                        passwd = Passwd(\n                            name=name,\n                            vendor=name,\n                            category=category,\n                            credentials=[cred],\n                            port=full_cells[4] or 0,\n                            comment=full_cells[5],\n                            raw=cells,\n                        )\n                        passwds_map[passwd.key] = passwd\n        except Exception as e:\n            cls.logger.error(\"Parse csv file %s failed.\" % file)\n            cls.logger.info(e)\n        passwds = passwds_map.values()\n        return passwds\n"
  },
  {
    "path": "totalpass/payloads/cirt/2wire inc/Wireless Routers.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: http\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: 2Wire, Inc. - Wireless Routers\nport: 0\nvendor: 2WIRE, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/360 systems/Image Server 2000.yml",
    "content": "auth:\n  credentials:\n  - password: factory\n    username: factory\ncategory: unknown\ncomment: ''\nname: 360 Systems - Image Server 2000\nport: 0\nvendor: 360 SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/3CRWE52196.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: 3COM - 3CRWE52196\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/AirConnect AP.yml",
    "content": "auth:\n  credentials:\n  - password: comcomcom\n    username: ''\ncategory: snmp\ncomment: ''\nname: 3COM - AirConnect AP\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/CellPlex.yml",
    "content": "auth:\n  credentials:\n  - password: tech\n    username: tech\ncategory: telnet\ncomment: 'Version: 7000; '\nname: 3COM - CellPlex\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/CoreBuilder.yml",
    "content": "auth:\n  credentials:\n  - password: synnet\n    username: debug\n  - password: tech\n    username: tech\ncategory: telnet\ncomment: 'Version: 7000/6000/3500/2500; '\nname: 3COM - CoreBuilder\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/HiPerARC.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: adm\ncategory: telnet\ncomment: 'Version: v4.1.x; '\nname: 3COM - HiPerARC\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/LANplex.yml",
    "content": "auth:\n  credentials:\n  - password: synnet\n    username: debug\n  - password: tech\n    username: tech\ncategory: telnet\ncomment: 'Version: 2500; '\nname: 3COM - LANplex\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/LinkSwitch.yml",
    "content": "auth:\n  credentials:\n  - password: tech\n    username: tech\ncategory: telnet\ncomment: 'Version: 2000/2700; '\nname: 3COM - LinkSwitch\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/N-A.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: adm\n  - password: synnet\n    username: admin\n  - password: manager\n    username: manager\n  - password: monitor\n    username: monitor\n  - password: synnet\n    username: read\n  - password: security\n    username: security\n  - password: synnet\n    username: write\ncategory: telnet\ncomment: ''\nname: 3COM - N/A\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/NetBuilder.yml",
    "content": "auth:\n  credentials:\n  - password: ANYCOM\n    username: ''\ncategory: snmp\ncomment: 'Notes: SNMP disabled by default; '\nname: 3COM - NetBuilder\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/Office Connect ISDN Routers.yml",
    "content": "auth:\n  credentials:\n  - password: PASSWORD\n    username: ''\ncategory: telnet\ncomment: 'Version: 5x0; Level: Administrator; '\nname: 3COM - Office Connect ISDN Routers\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/OfficeConnect Remote Router.yml",
    "content": "auth:\n  credentials:\n  - password: '!root'\n    username: root\ncategory: telnet\ncomment: 'Version: 812 ADSL, 840 SDSL; Level: Administrator; Doc: http://support.3com.com/infodeli/tools/remote/ocradsl/20/812_cli20.pdfhttp://support.3com.com/infodeli/tools/remote/ocremote/brouters/840/2sysadmin.htm; '\nname: 3COM - OfficeConnect Remote Router\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/OfficeConnect Wireless AP.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: 3COM - OfficeConnect Wireless AP\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/Router.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: boot prompt\ncomment: 'Version: 3000/5000 Series; Level: Administrator; Notes: 3COM Solution ID\n  3KB6942; '\nname: 3COM - Router\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/SuperStack II Switch.yml",
    "content": "auth:\n  credentials:\n  - password: monitor\n    username: monitor\n  - password: manager\n    username: manager\n  - password: ''\n    username: admin\n  - password: security\n    username: security\n  - password: synnet\n    username: debug\n  - password: tech\n    username: tech\ncategory: telnet\ncomment: 'Version: 1100/3300; Level: Monitor; '\nname: 3COM - SuperStack II Switch\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/Superstack 3 switch.yml",
    "content": "auth:\n  credentials:\n  - password: recover\n    username: recover\ncategory: console\ncomment: 'Version: 4900; Level: Administrator; Doc: http://support.3com.com/infodeli/tools/switches/ss3/4900/dha1770-0aaa04/htm/support/problemsolving/cliproblems.htm; '\nname: 3COM - Superstack 3 switch\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/US Robotics ADSL Router.yml",
    "content": "auth:\n  credentials:\n  - password: '12345'\n    username: ''\ncategory: http\ncomment: 'Version: 8550; Level: Administrator; '\nname: 3COM - US Robotics ADSL Router\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/Wireless AP.yml",
    "content": "auth:\n  credentials:\n  - password: comcomcom\n    username: ''\ncategory: unknown\ncomment: ''\nname: 3COM - Wireless AP\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3com/e960.yml",
    "content": "auth:\n  credentials:\n  - password: Admin\n    username: Admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: 3COM - e960\nport: 0\nvendor: 3COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/3m/Volition.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: volition\ncategory: unknown\ncomment: 'Version: VOL-0215; Level: Administrator; Doc: http://multimedia.3m.com/mws/mediawebserver?6666660Zjcf6lVs6EVs666xa9COrrrrQ-; '\nname: 3M - Volition\nport: 0\nvendor: 3M\n"
  },
  {
    "path": "totalpass/payloads/cirt/3m/Voliton.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: VOL-0215\ncategory: http\ncomment: 'Version: VOL-0215; Level: Administrator; Doc: http://multimedia.3m.com/mws/mediawebserver?6666660Zjcf6lVs6EVs666xa9COrrrrQ-; '\nname: 3M - Voliton\nport: 0\nvendor: 3M\n"
  },
  {
    "path": "totalpass/payloads/cirt/accelerated networks/DSL CPE and DSLAM.yml",
    "content": "auth:\n  credentials:\n  - password: anicust\n    username: sysadm\ncategory: telnet\ncomment: ''\nname: Accelerated Networks - DSL CPE and DSLAM\nport: 0\nvendor: ACCELERATED NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/accton/CheetahChassis Workgroup Switch - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: telnet\ncomment: 'Version: 3714; '\nname: ACCTON - CheetahChassis Workgroup Switch - telnet\nport: 0\nvendor: ACCTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/accton/CheetahChassis Workgroup Switch - web.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: web\ncomment: 'Version: 3714; '\nname: ACCTON - CheetahChassis Workgroup Switch - web\nport: 0\nvendor: ACCTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/accton/CheetahChassis Workgroup Switch.yml",
    "content": "auth:\n  credentials:\n  - password: monitor\n    username: monitor\n  - password: manager\n    username: manager\n  - password: ''\n    username: admin\ncategory: snmp\ncomment: 'Version: 3714; '\nname: ACCTON - CheetahChassis Workgroup Switch\nport: 0\nvendor: ACCTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/accton/Gigabit Switches - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: (caclulated)\n    username: __super\ncategory: ssh\ncomment: 'Level: Administrator; Doc: http://www.vettebak.nl/hak/; Notes: The password\n  is based on the MAC address--see link for info. Devices sold by 3Com, Dell, SMC,\n  Foundry and EdgeCore.; '\nname: ACCTON - Gigabit Switches - ssh\nport: 0\nvendor: ACCTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/accton/Gigabit Switches.yml",
    "content": "auth:\n  credentials:\n  - password: (caclulated)\n    username: __super\ncategory: telnet\ncomment: 'Level: Administrator; Doc: http://www.vettebak.nl/hak/; Notes: The password\n  is based on the MAC address--see link for info. Devices sold by 3Com, Dell, SMC,\n  Foundry and EdgeCore.; '\nname: ACCTON - Gigabit Switches\nport: 0\nvendor: ACCTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/accton/Wirelessrouter.yml",
    "content": "auth:\n  credentials:\n  - password: '0000'\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: ACCTON - Wirelessrouter\nport: 0\nvendor: ACCTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/acer/BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Acer - BIOS\nport: 0\nvendor: ACER\n"
  },
  {
    "path": "totalpass/payloads/cirt/actiontec/GE344000-01.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Actiontec - GE344000-01\nport: 0\nvendor: ACTIONTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/actiontec/M1424WR.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://onlinehelp.verizon.net/consumer/bin/pdf/NetworkSteps/ConfiguringActiontecM1424WRSecurity2.pdf;\n  Notes: http://192.168.1.1/; '\nname: Actiontec - M1424WR\nport: 0\nvendor: ACTIONTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/adaptec/RAID Controller.yml",
    "content": "auth:\n  credentials:\n  - password: adaptec\n    username: Administrator\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Adaptec - RAID Controller\nport: 0\nvendor: ADAPTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/adc kentrox/Pacesetter Router.yml",
    "content": "auth:\n  credentials:\n  - password: secret\n    username: ''\ncategory: telnet\ncomment: ''\nname: ADC Kentrox - Pacesetter Router\nport: 0\nvendor: ADC KENTROX\n"
  },
  {
    "path": "totalpass/payloads/cirt/adcompletecom/Ban Man Pro.yml",
    "content": "auth:\n  credentials:\n  - password: Admin1\n    username: Admin1\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: AdComplete.com - Ban Man Pro\nport: 0\nvendor: ADCOMPLETE.COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/adcompletecom/Banman Pro.yml",
    "content": "auth:\n  credentials:\n  - password: Admin1\n    username: Admin1\ncategory: http\ncomment: 'Version: 12; Level: Administrator; Doc: http://www.banmanpro.com/installnet40.asp; '\nname: AdComplete.com - Banman Pro\nport: 0\nvendor: ADCOMPLETE.COM\n"
  },
  {
    "path": "totalpass/payloads/cirt/addpac technology/AP2120.yml",
    "content": "auth:\n  credentials:\n  - password: router\n    username: root\ncategory: http\ncomment: 'Level: Administrator; '\nname: AddPac Technology - AP2120\nport: 0\nvendor: ADDPAC TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/adobe/CQ.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: author\n    username: author\ncategory: unknown\ncomment: 'Level: Administrator; Doc: https://docs.adobe.com/docs/v5_2/html-resources/cq5_guide_power_user/ch07s02.html#sect_default_users_and_groups;\n  Notes: This account is used for the connection between CQ WCM and CRX.; '\nname: Adobe - CQ\nport: 0\nvendor: ADOBE\n"
  },
  {
    "path": "totalpass/payloads/cirt/adobe/Experience Manager-CQ.yml",
    "content": "auth:\n  credentials:\n  - password: anonymous\n    username: anonymous\n  - password: replication-receiver\n    username: replication-receiver\n  - password: jdoe\n    username: jdoe@geometrixx.info\n  - password: aparker\n    username: aparker@geometrixx.info\ncategory: unknown\ncomment: 'Doc: http://resources.infosecinstitute.com/adobe-cq-pentesting-guide-part-1/; '\nname: Adobe - Experience Manager/CQ\nport: 0\nvendor: ADOBE\n"
  },
  {
    "path": "totalpass/payloads/cirt/adobe/Experience Manager.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://helpx.adobe.com/experience-manager/using/datasourcepool.html; '\nname: Adobe - Experience Manager\nport: 0\nvendor: ADOBE\n"
  },
  {
    "path": "totalpass/payloads/cirt/adobe/Vignette Connector.yml",
    "content": "auth:\n  credentials:\n  - password: vgnadmin\n    username: vgnadmin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://dev.day.com/content/docs/en/crx/connectors/vignette/current.html; '\nname: Adobe - Vignette Connector\nport: 0\nvendor: ADOBE\n"
  },
  {
    "path": "totalpass/payloads/cirt/adt/Safewatch Pro3000.yml",
    "content": "auth:\n  credentials:\n  - password: '2580'\n    username: ''\ncategory: unknown\ncomment: 'Level: Duress; Doc: http://krebsonsecurity.com/2013/01/does-your-alarm-have-a-default-duress-code/;\n  Notes: This is a \"duress\" code and likely on multiple ADT models as set by technicians.; '\nname: ADT - Safewatch Pro3000\nport: 0\nvendor: ADT\n"
  },
  {
    "path": "totalpass/payloads/cirt/adtech/AX4000.yml",
    "content": "auth:\n  credentials:\n  - password: ax400\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Adtech - AX4000\nport: 0\nvendor: ADTECH\n"
  },
  {
    "path": "totalpass/payloads/cirt/adtran/MX2800.yml",
    "content": "auth:\n  credentials:\n  - password: adtran\n    username: ''\ncategory: telnet\ncomment: ''\nname: Adtran - MX2800\nport: 0\nvendor: ADTRAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/adtran/NetVanta.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Version: 3430; Level: Administrator; Doc: http://www.adtran.com/pub/Library/Quick_Start_Guides/Public_View/NetVanta%203430%20Quick%20Start%20Guide.pdf; '\nname: Adtran - NetVanta\nport: 0\nvendor: ADTRAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/advanced integration/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Advance\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Advanced Integration - PC BIOS\nport: 0\nvendor: ADVANCED INTEGRATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/airaya corp/AIRAYA WirelessGRID.yml",
    "content": "auth:\n  credentials:\n  - password: Airaya\n    username: Airaya\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.airaya.com/support/guides/WirelessGRID-Manual_O.pdf;\n  Notes: The default IP address is 192.168.1.70.; '\nname: AIRAYA Corp - AIRAYA WirelessGRID\nport: 0\nvendor: AIRAYA CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/airlink/AnyGate.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: http\ncomment: 'Version: GW-200; Level: Administrator; '\nname: Airlink - AnyGate\nport: 0\nvendor: AIRLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/airlink plus/RTW026.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: http\ncomment: 'Version: V0.80.0010 (firmware); Level: Administrator; '\nname: AirLink Plus - RTW026\nport: 0\nvendor: AIRLINK PLUS\n"
  },
  {
    "path": "totalpass/payloads/cirt/aironet/(All).yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: (blank)\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Aironet - (All)\nport: 0\nvendor: AIRONET\n"
  },
  {
    "path": "totalpass/payloads/cirt/airway/Transport.yml",
    "content": "auth:\n  credentials:\n  - password: '0000'\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Airway - Transport\nport: 0\nvendor: AIRWAY\n"
  },
  {
    "path": "totalpass/payloads/cirt/aladdin/eSafe Appliance - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: kn1TG7psLu\n    username: root\ncategory: ssh\ncomment: 'Level: root; '\nname: Aladdin - eSafe Appliance - ssh\nport: 0\nvendor: ALADDIN\n"
  },
  {
    "path": "totalpass/payloads/cirt/aladdin/eSafe Appliance.yml",
    "content": "auth:\n  credentials:\n  - password: kn1TG7psLu\n    username: root\ncategory: console\ncomment: 'Level: root; '\nname: Aladdin - eSafe Appliance\nport: 0\nvendor: ALADDIN\n"
  },
  {
    "path": "totalpass/payloads/cirt/alcatel/PBX.yml",
    "content": "auth:\n  credentials:\n  - password: tlah\n    username: halt\n  - password: llatsni\n    username: install\n  - password: dhs3pms\n    username: dhs3pms\n  - password: adfexc\n    username: adfexc\n  - password: client\n    username: client\n  - password: kermit\n    username: kermit\n  - password: dhs3mt\n    username: dhs3mt\n  - password: at4400\n    username: at4400\n  - password: mtch\n    username: mtch\n  - password: mtcl\n    username: mtcl\n  - password: letacla\n    username: root\ncategory: telnet\ncomment: 'Version: 4400; Notes: This will immediately shutdown the 4400 upon login!\n  Account is UID 0.; '\nname: Alcatel - PBX\nport: 0\nvendor: ALCATEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/alcatel/Speedtouch - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: telnet\ncomment: 'Version: 510; Doc: http://www.speedtouch.com/support.htm; Notes: Default\n  IP 192.168.1.254/24; '\nname: Alcatel - Speedtouch - telnet\nport: 0\nvendor: ALCATEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/alcatel/Speedtouch.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: http\ncomment: 'Version: 510; Doc: http://www.speedtouch.com/support.htm; Notes: Default\n  IP 192.168.1.254/24; '\nname: Alcatel - Speedtouch\nport: 0\nvendor: ALCATEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/alien technology/ALR-9900 - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: alien\n    username: alien\ncategory: ssh\ncomment: 'Level: Administrator; Doc: http://seclists.org/fulldisclosure/2010/May/63;\n  Notes: Undocumented telnet ports: 23,2323.; '\nname: Alien Technology - ALR-9900 - ssh\nport: 0\nvendor: ALIEN TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/alien technology/ALR-9900.yml",
    "content": "auth:\n  credentials:\n  - password: alien\n    username: root\n  - password: alien\n    username: alien\ncategory: telnet\ncomment: 'Level: Administrator; Doc: http://seclists.org/fulldisclosure/2010/May/63;\n  Notes: Undocumented telnet ports: 23,2323.; '\nname: Alien Technology - ALR-9900\nport: 0\nvendor: ALIEN TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/allied telesyn/Rapier G6 Switch.yml",
    "content": "auth:\n  credentials:\n  - password: manager\n    username: ''\ncategory: unknown\ncomment: 'Level: friend; '\nname: Allied Telesyn - Rapier G6 Switch\nport: 0\nvendor: ALLIED TELESYN\n"
  },
  {
    "path": "totalpass/payloads/cirt/allied telesyn/Various Switches.yml",
    "content": "auth:\n  credentials:\n  - password: manager\n    username: manager\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Allied Telesyn - Various Switches\nport: 0\nvendor: ALLIED TELESYN\n"
  },
  {
    "path": "totalpass/payloads/cirt/allnet/ALL129DSL.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.allnet.de/; '\nname: Allnet - ALL129DSL\nport: 0\nvendor: ALLNET\n"
  },
  {
    "path": "totalpass/payloads/cirt/allot/Netenforcer.yml",
    "content": "auth:\n  credentials:\n  - password: bagabu\n    username: root\n  - password: allot\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Allot - Netenforcer\nport: 0\nvendor: ALLOT\n"
  },
  {
    "path": "totalpass/payloads/cirt/alteon/ACEswitch - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: telnet\ncomment: 'Version: 180e; '\nname: Alteon - ACEswitch - telnet\nport: 0\nvendor: ALTEON\n"
  },
  {
    "path": "totalpass/payloads/cirt/alteon/ACEswitch.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 180e; Level: Administrator; '\nname: Alteon - ACEswitch\nport: 0\nvendor: ALTEON\n"
  },
  {
    "path": "totalpass/payloads/cirt/ambit/Cable Modems.yml",
    "content": "auth:\n  credentials:\n  - password: user\n    username: user\n  - password: root\n    username: root\ncategory: unknown\ncomment: ''\nname: Ambit - Cable Modems\nport: 0\nvendor: AMBIT\n"
  },
  {
    "path": "totalpass/payloads/cirt/ami/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: AM\n    username: ''\n  - password: AMI\n    username: ''\n  - password: A.M.I\n    username: ''\n  - password: AMI_SW\n    username: ''\n  - password: AMI?SW\n    username: ''\n  - password: aammii\n    username: ''\n  - password: AMI!SW\n    username: ''\n  - password: AMI.KEY\n    username: ''\n  - password: AMI.KEZ\n    username: ''\n  - password: AMI~\n    username: ''\n  - password: AMIPSWD\n    username: ''\n  - password: AMISETUP\n    username: ''\n  - password: BIOSPASS\n    username: ''\n  - password: CMOSPWD\n    username: ''\n  - password: HEWITT RAND\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: AMI - PC BIOS\nport: 0\nvendor: AMI\n"
  },
  {
    "path": "totalpass/payloads/cirt/amino/AmiNET Set Top Box.yml",
    "content": "auth:\n  credentials:\n  - password: leaves\n    username: ''\n  - password: snake\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.vsicam.com/files/documents/AmiNet/AmiNet_and_AVN_Configuration_Manual.pdf;\n  Notes: Management Password; '\nname: Amino - AmiNET Set Top Box\nport: 0\nvendor: AMINO\n"
  },
  {
    "path": "totalpass/payloads/cirt/ampjuke/AmpJuke.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: AmpJuke - AmpJuke\nport: 0\nvendor: AMPJUKE\n"
  },
  {
    "path": "totalpass/payloads/cirt/amptron/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Polrty\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Amptron - PC BIOS\nport: 0\nvendor: AMPTRON\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/CSG.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - CSG\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/Endeleo UDM-0102.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - Endeleo UDM-0102\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/Endeleo UDM-0404.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - Endeleo UDM-0404\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/Endeleo UDM-0808-SIG.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: administrator\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - Endeleo UDM-0808-SIG\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/Environmental Controls ENV-VST-C.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - Environmental Controls ENV-VST-C\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/IS-SPX-1000.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - IS-SPX-1000\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/MAX Server.yml",
    "content": "auth:\n  credentials:\n  - password: mozart\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - MAX Server\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/MAX-CSD10.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: administrator\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - MAX-CSD10\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/MAX-CSE.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: administrator\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - MAX-CSE\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/MET-ECOM--D.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - MET-ECOM/-D\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/NI Series.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: administrator\n  - password: password\n    username: NetLinx\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - NI Series\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/NXA-ENET24.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: Admin\n  - password: guest\n    username: guest\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - NXA-ENET24\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/NXA-ENET8POE.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - NXA-ENET8POE\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/NXA-WAP1000.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - NXA-WAP1000\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/NXA-WAP250G.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - NXA-WAP250G\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/NXA-WAPZD1000 (Zone Director).yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - NXA-WAPZD1000 (Zone Director)\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/NXR-ZGW--ZRP.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - NXR-ZGW/-ZRP\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/NXR-ZGW-PRO--ZRP-PRO.yml",
    "content": "auth:\n  credentials:\n  - password: '1988'\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - NXR-ZGW-PRO/-ZRP-PRO\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/TVM-1600.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - TVM-1600\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/amx/V2 Server.yml",
    "content": "auth:\n  credentials:\n  - password: vision2\n    username: Administrator\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.amx.com/techsupport/PDFs/981.pdf; '\nname: AMX - V2 Server\nport: 0\nvendor: AMX\n"
  },
  {
    "path": "totalpass/payloads/cirt/apache/Tomcat - unknown.yml",
    "content": "auth:\n  credentials:\n  - password: j5Brn9\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: As installed in Sun Solaris.; '\nname: Apache - Tomcat - unknown\nport: 0\nvendor: APACHE\n"
  },
  {
    "path": "totalpass/payloads/cirt/apache/Tomcat.yml",
    "content": "auth:\n  credentials:\n  - password: tomcat\n    username: admin\n  - password: admin\n    username: admin\n  - password: tomcat\n    username: tomcat\n  - password: tomcat\n    username: admin\n  - password: root\n    username: root\n  - password: role1\n    username: role1\n  - password: changethis\n    username: role\n  - password: changethis\n    username: root\n  - password: changethis\n    username: tomcat\n  - password: tomcat\n    username: both\n  - password: tomcat\n    username: role1\ncategory: http\ncomment: ''\nname: Apache - Tomcat\nport: 0\nvendor: APACHE\n"
  },
  {
    "path": "totalpass/payloads/cirt/apache project/N-A.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: jj\ncategory: unknown\ncomment: 'Version: Apache; Level: script; '\nname: Apache Project - N/A\nport: 0\nvendor: APACHE PROJECT\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/AP9606 SmartSlot Web-SNMP Management Card.yml",
    "content": "auth:\n  credentials:\n  - password: TENmanUFactOryPOWER\n    username: (any)\ncategory: telnet\ncomment: 'Version: AOS 3.2.1 and AOS 3.0.3; '\nname: APC - AP9606 SmartSlot Web/SNMP Management Card\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/Call-UPS.yml",
    "content": "auth:\n  credentials:\n  - password: serial number of the Call-UPS\n    username: ''\ncategory: console\ncomment: 'Version: AP9608; Level: Administrator; Notes: (Access menu Control+P); '\nname: APC - Call-UPS\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/MasterSwitch.yml",
    "content": "auth:\n  credentials:\n  - password: apc\n    username: apc\ncategory: unknown\ncomment: 'Version: AP9210; Level: Administrator; '\nname: APC - MasterSwitch\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/Powerchute Plus.yml",
    "content": "auth:\n  credentials:\n  - password: APC\n    username: POWERCHUTE\ncategory: console\ncomment: 'Version: 4.x for Netware 3.x/4.x; Level: Administrator; '\nname: APC - Powerchute Plus\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/SNMP Adapter.yml",
    "content": "auth:\n  credentials:\n  - password: apc\n    username: apc\ncategory: unknown\ncomment: 'Version: 2.x; '\nname: APC - SNMP Adapter\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/Share-UPS.yml",
    "content": "auth:\n  credentials:\n  - password: serial number of the Share-UPS\n    username: ''\ncategory: console\ncomment: 'Version: AP9207; Level: Administrator; '\nname: APC - Share-UPS\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/UPS Network Management Card 2 - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: apc\n    username: device\ncategory: ssh\ncomment: 'Level: Restricted User; Doc: https://www.jlab.org/Hall-D/Documents/manuals/APC%20stuff/AP9630%209631%20UPS%20Network%20Management%20Card%202%20User''s%20Guide%20firmware%20V5.1.1.pdf; '\nname: APC - UPS Network Management Card 2 - ssh\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/UPS Network Management Card 2 - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: apc\n    username: device\ncategory: telnet\ncomment: 'Level: Restricted User; Doc: https://www.jlab.org/Hall-D/Documents/manuals/APC%20stuff/AP9630%209631%20UPS%20Network%20Management%20Card%202%20User''s%20Guide%20firmware%20V5.1.1.pdf; '\nname: APC - UPS Network Management Card 2 - telnet\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/UPS Network Management Card 2.yml",
    "content": "auth:\n  credentials:\n  - password: apc\n    username: readonly\ncategory: http\ncomment: 'Level: Read Only; Doc: https://www.jlab.org/Hall-D/Documents/manuals/APC%20stuff/AP9630%209631%20UPS%20Network%20Management%20Card%202%20User''s%20Guide%20firmware%20V5.1.1.pdf; '\nname: APC - UPS Network Management Card 2\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apc/Web-SNMP Management Card.yml",
    "content": "auth:\n  credentials:\n  - password: apc\n    username: apc\ncategory: multi\ncomment: 'Version: AP9606; Level: Administrator; '\nname: APC - Web/SNMP Management Card\nport: 0\nvendor: APC\n"
  },
  {
    "path": "totalpass/payloads/cirt/apple/iPhone.yml",
    "content": "auth:\n  credentials:\n  - password: alpine\n    username: root\n  - password: dottie\n    username: mobile\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Apple - iPhone\nport: 0\nvendor: APPLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/apple computer/Airport.yml",
    "content": "auth:\n  credentials:\n  - password: public\n    username: (blank)\ncategory: unknown\ncomment: 'Level: User; '\nname: Apple Computer - Airport\nport: 0\nvendor: APPLE COMPUTER\n"
  },
  {
    "path": "totalpass/payloads/cirt/apple computer/Network Assistant.yml",
    "content": "auth:\n  credentials:\n  - password: xyzzy\n    username: (blank)\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Apple Computer - Network Assistant\nport: 0\nvendor: APPLE COMPUTER\n"
  },
  {
    "path": "totalpass/payloads/cirt/apple computer/Remote Desktop.yml",
    "content": "auth:\n  credentials:\n  - password: xyzzy\n    username: (blank)\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Apple Computer - Remote Desktop\nport: 0\nvendor: APPLE COMPUTER\n"
  },
  {
    "path": "totalpass/payloads/cirt/arris/Touchstone Gateway.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Arris - Touchstone Gateway\nport: 0\nvendor: ARRIS\n"
  },
  {
    "path": "totalpass/payloads/cirt/arrowpoint/Unknown.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: (blank)\n  - password: system\n    username: admin\ncategory: unknown\ncomment: ''\nname: Arrowpoint - Unknown\nport: 0\nvendor: ARROWPOINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/aruba/Mobility Controller.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: then ''enable'' and default password ''admin''; '\nname: Aruba - Mobility Controller\nport: 0\nvendor: ARUBA\n"
  },
  {
    "path": "totalpass/payloads/cirt/asante/FM2008.yml",
    "content": "auth:\n  credentials:\n  - password: asante\n    username: superuser\ncategory: telnet\ncomment: 'Version: 01.06; Level: Administrator; '\nname: Asante - FM2008\nport: 0\nvendor: ASANTE\n"
  },
  {
    "path": "totalpass/payloads/cirt/ascend/Router.yml",
    "content": "auth:\n  credentials:\n  - password: ascend\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Ascend - Router\nport: 0\nvendor: ASCEND\n"
  },
  {
    "path": "totalpass/payloads/cirt/ascom/Ascotel.yml",
    "content": "auth:\n  credentials:\n  - password: 3ascotel\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: https://pbxweb.aastra.com/extra/support/attachments/KnowledgeBase/00887/Ascotel_2050_with_AIP6400_.pdf; '\nname: Ascom - Ascotel\nport: 0\nvendor: ASCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ast/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: SnuFG5\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: AST - PC BIOS\nport: 0\nvendor: AST\n"
  },
  {
    "path": "totalpass/payloads/cirt/asus/520g.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Asus - 520g\nport: 0\nvendor: ASUS\n"
  },
  {
    "path": "totalpass/payloads/cirt/asus/RT-N16.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Asus - RT-N16\nport: 0\nvendor: ASUS\n"
  },
  {
    "path": "totalpass/payloads/cirt/asus/WL-500G.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Asus - WL-500G\nport: 0\nvendor: ASUS\n"
  },
  {
    "path": "totalpass/payloads/cirt/asus/WL-HDD2.5.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.1.220; '\nname: Asus - WL-HDD2.5\nport: 0\nvendor: ASUS\n"
  },
  {
    "path": "totalpass/payloads/cirt/atlassian/Crowd.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: \"crowd\\xAD-openid-\\xADserver\"\n  - password: password\n    username: Crowd\n  - password: password\n    username: Demo\n  - password: password\n    username: Username\ncategory: unknown\ncomment: 'Version: 2.6.2; Doc: http://www.commandfive.com/papers/C5_TA_2013_3925_AtlassianCrowd.pdf; '\nname: Atlassian - Crowd\nport: 0\nvendor: ATLASSIAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/attachmate/Attachmate Gateway.yml",
    "content": "auth:\n  credentials:\n  - password: PASSWORD\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Attachmate - Attachmate Gateway\nport: 0\nvendor: ATTACHMATE\n"
  },
  {
    "path": "totalpass/payloads/cirt/audioactive/MPEG Realtime Encoders.yml",
    "content": "auth:\n  credentials:\n  - password: telos\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Audioactive - MPEG Realtime Encoders\nport: 0\nvendor: AUDIOACTIVE\n"
  },
  {
    "path": "totalpass/payloads/cirt/autodesk/Autocad.yml",
    "content": "auth:\n  credentials:\n  - password: autocad\n    username: autocad\ncategory: multi\ncomment: 'Level: User; '\nname: Autodesk - Autocad\nport: 0\nvendor: AUTODESK\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/4602 SIP Telephone.yml",
    "content": "auth:\n  credentials:\n  - password: barney\n    username: admin\ncategory: http\ncomment: 'Version: 1.1; '\nname: Avaya - 4602 SIP Telephone\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/Definity.yml",
    "content": "auth:\n  credentials:\n  - password: dadmin\n    username: dadmin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Avaya - Definity\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/Integrated Management Database (IMD).yml",
    "content": "auth:\n  credentials:\n  - password: admin123\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Avaya - Integrated Management Database (IMD)\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/Intuity Audix.yml",
    "content": "auth:\n  credentials:\n  - password: crftpw\n    username: Craft\ncategory: unknown\ncomment: ''\nname: Avaya - Intuity Audix\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/P330 Stackable Switch.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: root\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Avaya - P330 Stackable Switch\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/Scopia Gateway.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://downloads.avaya.com/css/P8/documents/100181785; '\nname: Avaya - Scopia Gateway\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/Scopia.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://downloads.avaya.com/css/P8/documents/100173462; '\nname: Avaya - Scopia\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/Winspm.yml",
    "content": "auth:\n  credentials:\n  - password: Craftr4\n    username: ''\ncategory: unknown\ncomment: ''\nname: Avaya - Winspm\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avaya/routers.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: root\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Avaya - routers\nport: 0\nvendor: AVAYA\n"
  },
  {
    "path": "totalpass/payloads/cirt/avenger news system (ans)/ANS.yml",
    "content": "auth:\n  credentials:\n  - password: Administrative\n    username: ''\ncategory: http\ncomment: 'Notes: default string: admin:aaLR8vE.jjhss:root@127.0.0.1pass file is located\n  at ans_data/ans.passwd (relative to ans.pl location); '\nname: Avenger News System (ANS) - ANS\nport: 0\nvendor: AVENGER NEWS SYSTEM (ANS)\n"
  },
  {
    "path": "totalpass/payloads/cirt/award/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Award\n    username: ''\n  - password: AWARD_SW\n    username: ''\n  - password: SW_AWARD\n    username: ''\n  - password: AWARD?SW\n    username: ''\n  - password: lkwpeter\n    username: ''\n  - password: j262\n    username: ''\n  - password: j256\n    username: ''\n  - password: ?award\n    username: ''\n  - password: '1322222'\n    username: ''\n  - password: '256256'\n    username: ''\n  - password: '589589'\n    username: ''\n  - password: '589721'\n    username: ''\n  - password: admin\n    username: ''\n  - password: alfarome\n    username: ''\n  - password: aLLy\n    username: ''\n  - password: aPAf\n    username: ''\n  - password: AWARD SW\n    username: ''\n  - password: award.sw\n    username: ''\n  - password: award_?\n    username: ''\n  - password: award_ps\n    username: ''\n  - password: AWARD_PW\n    username: ''\n  - password: awkward\n    username: ''\n  - password: BIOS\n    username: ''\n  - password: biosstar\n    username: ''\n  - password: biostar\n    username: ''\n  - password: CONCAT\n    username: ''\n  - password: condo\n    username: ''\n  - password: ''\n    username: ''\n  - password: djonet\n    username: ''\n  - password: efmukl\n    username: ''\n  - password: g6PJ\n    username: ''\n  - password: h6BB\n    username: ''\n  - password: HELGA-S\n    username: ''\n  - password: HEWITT RAND\n    username: ''\n  - password: HLT\n    username: ''\n  - password: j09F\n    username: ''\n  - password: j322\n    username: ''\n  - password: j64\n    username: ''\n  - password: lkw peter\n    username: ''\n  - password: PASSWORD\n    username: ''\n  - password: SER\n    username: ''\n  - password: setup\n    username: ''\n  - password: SKY_FOX\n    username: ''\n  - password: SWITCHES_SW\n    username: ''\n  - password: Sxyz\n    username: ''\n  - password: SZYX\n    username: ''\n  - password: t0ch20x\n    username: ''\n  - password: t0ch88\n    username: ''\n  - password: TTPTHA\n    username: ''\n  - password: TzqF\n    username: ''\n  - password: wodj\n    username: ''\n  - password: ZAAADA\n    username: ''\n  - password: zbaaaca\n    username: ''\n  - password: zjaaadc\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: AWARD - PC BIOS\nport: 0\nvendor: AWARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/axis/Camera Server.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: root\ncategory: unknown\ncomment: 'Version: 2100/2120/2420; Level: Administrator; '\nname: Axis - Camera Server\nport: 0\nvendor: AXIS\n"
  },
  {
    "path": "totalpass/payloads/cirt/axis/StorPoint CD E100.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Axis - StorPoint CD E100\nport: 0\nvendor: AXIS\n"
  },
  {
    "path": "totalpass/payloads/cirt/axis/StorPoint NAS 100.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Axis - StorPoint NAS 100\nport: 0\nvendor: AXIS\n"
  },
  {
    "path": "totalpass/payloads/cirt/axis communications/Axis Network Camera - http.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: root\ncategory: http\ncomment: 'Version: 2120, 2110, 2100, 200+, 200; Level: Administrator; '\nname: Axis Communications - Axis Network Camera - http\nport: 0\nvendor: AXIS COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/axis communications/Axis Network Camera - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: root\ncategory: telnet\ncomment: 'Version: 2120, 2110, 2100, 200+, 200; Level: Administrator; '\nname: Axis Communications - Axis Network Camera - telnet\nport: 0\nvendor: AXIS COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/axis communications/Axis Network Camera.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: root\ncategory: ftp\ncomment: 'Version: 2120, 2110, 2100, 200+, 200; Level: Administrator; '\nname: Axis Communications - Axis Network Camera\nport: 0\nvendor: AXIS COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/axis communications/Printserver.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: root\ncategory: multi\ncomment: 'Version: 540/540+; Level: Administrator; '\nname: Axis Communications - Printserver\nport: 0\nvendor: AXIS COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/axway/SecureTransport.yml",
    "content": "auth:\n  credentials:\n  - password: setup\n    username: setup\ncategory: http\ncomment: 'Doc: https://cdn.axway.com/u/documentation/secure_transport/5.3.0/SecureTransport_GettingStartedGuide_allOS_en.pdf; '\nname: Axway - SecureTransport\nport: 0\nvendor: AXWAY\n"
  },
  {
    "path": "totalpass/payloads/cirt/barco inc/ClickShare - ssid.yml",
    "content": "auth:\n  credentials:\n  - password: clickshare\n    username: ''\ncategory: ssid\ncomment: 'Doc: https://www.barco.com/tde/(2331390682231610)/R5900004/08/Barco_InstallationManual_R5900004_08__ClickShare-CSC-1-Installation-Guide.pdf;\n  Notes: SSID: clickshare-serialnumber; '\nname: Barco, Inc. - ClickShare - ssid\nport: 0\nvendor: BARCO, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/barco inc/ClickShare.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://www.barco.com/tde/(2331390682231610)/R5900004/08/Barco_InstallationManual_R5900004_08__ClickShare-CSC-1-Installation-Guide.pdf; '\nname: Barco, Inc. - ClickShare\nport: 0\nvendor: BARCO, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/barracuda/SSL VPN - http.yml",
    "content": "auth:\n  credentials:\n  - password: ssladmin\n    username: ssladmin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.barracudanetworks.com/ns/downloads/Quick_Start_Guides/QSG_Barracuda_SSLVPN_US.pdf;\n  Notes: Via WAN interface.; '\nname: Barracuda - SSL VPN - http\nport: 0\nvendor: BARRACUDA\n"
  },
  {
    "path": "totalpass/payloads/cirt/barracuda/SSL VPN.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: console\ncomment: 'Level: Administrator; Doc: http://www.barracudanetworks.com/ns/downloads/Quick_Start_Guides/QSG_Barracuda_SSLVPN_US.pdf; '\nname: Barracuda - SSL VPN\nport: 0\nvendor: BARRACUDA\n"
  },
  {
    "path": "totalpass/payloads/cirt/bay networks/Router.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: Manager\n  - password: ''\n    username: User\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Bay Networks - Router\nport: 0\nvendor: BAY NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/bay networks/SuperStack II.yml",
    "content": "auth:\n  credentials:\n  - password: security\n    username: security\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Bay Networks - SuperStack II\nport: 0\nvendor: BAY NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/bay networks/Switch.yml",
    "content": "auth:\n  credentials:\n  - password: NetICs\n    username: ''\ncategory: telnet\ncomment: 'Version: 350T; Level: Administrator; '\nname: Bay Networks - Switch\nport: 0\nvendor: BAY NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/best practical solutions/Request Tracker.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://requesttracker.wikia.com/wiki/RecoverRootPassword;\n  Notes: RT; '\nname: Best Practical Solutions - Request Tracker\nport: 0\nvendor: BEST PRACTICAL SOLUTIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/bestpractical/RT.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: root\ncategory: http\ncomment: 'Level: Administrator; '\nname: BestPractical - RT\nport: 0\nvendor: BESTPRACTICAL\n"
  },
  {
    "path": "totalpass/payloads/cirt/bewan/Wireless Routers.yml",
    "content": "auth:\n  credentials:\n  - password: bewan\n    username: bewan\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Bewan - Wireless Routers\nport: 0\nvendor: BEWAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/billion/BiGuard.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: administrator; '\nname: Billion - BiGuard\nport: 0\nvendor: BILLION\n"
  },
  {
    "path": "totalpass/payloads/cirt/billion/BiPAC 7404VGO.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Billion - BiPAC 7404VGO\nport: 0\nvendor: BILLION\n"
  },
  {
    "path": "totalpass/payloads/cirt/bintec/Bianka Routers.yml",
    "content": "auth:\n  credentials:\n  - password: bintec\n    username: admin\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Bintec - Bianka Routers\nport: 0\nvendor: BINTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/bintec/Router.yml",
    "content": "auth:\n  credentials:\n  - password: funkwerk\n    username: admin\ncategory: unknown\ncomment: 'Version: R230a, R230aw, R232b, R232aw, R232bw, R1200, R1200w, R1200wu, R3000,\n  R3000w, R3400, R3800, R4100, R4300; Level: Administrator; '\nname: Bintec - Router\nport: 0\nvendor: BINTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/biodata/BIGfire.yml",
    "content": "auth:\n  credentials:\n  - password: Babylon\n    username: ''\ncategory: unknown\ncomment: ''\nname: Biodata - BIGfire\nport: 0\nvendor: BIODATA\n"
  },
  {
    "path": "totalpass/payloads/cirt/biodata/Babylon.yml",
    "content": "auth:\n  credentials:\n  - password: Babylon\n    username: ''\ncategory: unknown\ncomment: ''\nname: Biodata - Babylon\nport: 0\nvendor: BIODATA\n"
  },
  {
    "path": "totalpass/payloads/cirt/biostar/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Biostar\n    username: ''\n  - password: Q54arwms\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Biostar - PC BIOS\nport: 0\nvendor: BIOSTAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/biscom/Biscom Delivery Server (BDS).yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: multiple\ncomment: 'Level: Administrator; Doc: http://ticsoftware.helpserve.com/Knowledgebase/Article/GetAttachment/48/40; '\nname: Biscom - Biscom Delivery Server (BDS)\nport: 0\nvendor: BISCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/bizdesign/ImageFoliio.yml",
    "content": "auth:\n  credentials:\n  - password: ImageFolio\n    username: Admin\ncategory: http\ncomment: 'Version: 2.2; Level: Administrator; '\nname: BizDesign - ImageFoliio\nport: 0\nvendor: BIZDESIGN\n"
  },
  {
    "path": "totalpass/payloads/cirt/bizdesign/ImageFolio Pro.yml",
    "content": "auth:\n  credentials:\n  - password: ImageFolio\n    username: Admin\ncategory: http\ncomment: 'Version: 2.2; Level: Administrator; Notes: default admin page is:/cgi-bin/admin/admin.cgi; '\nname: BizDesign - ImageFolio Pro\nport: 0\nvendor: BIZDESIGN\n"
  },
  {
    "path": "totalpass/payloads/cirt/black duck software inc/Administration Console.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: port 7081; '\nname: Black Duck Software, Inc. - Administration Console\nport: 0\nvendor: BLACK DUCK SOFTWARE, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/black duck software inc/Hub.yml",
    "content": "auth:\n  credentials:\n  - password: blackduck\n    username: sysadmin\ncategory: http\ncomment: 'Level: Administrator; Notes: port 8080; '\nname: Black Duck Software, Inc. - Hub\nport: 0\nvendor: BLACK DUCK SOFTWARE, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/black widow web design ltd/Saxon.yml",
    "content": "auth:\n  credentials:\n  - password: nimda\n    username: admin\ncategory: http\ncomment: 'Version: 5.4; Level: Administrator; '\nname: Black Widow Web Design Ltd - Saxon\nport: 0\nvendor: BLACK WIDOW WEB DESIGN LTD\n"
  },
  {
    "path": "totalpass/payloads/cirt/blitzz technologies/BWA711.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Blitzz Technologies - BWA711\nport: 0\nvendor: BLITZZ TECHNOLOGIES\n"
  },
  {
    "path": "totalpass/payloads/cirt/bmc software/Performance Assurance for Microsoft Servers.yml",
    "content": "auth:\n  credentials:\n  - password: BackupU$r\n    username: Best1_User\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://krebsonsecurity.com/2014/01/new-clues-in-the-target-breach/;\n  Notes: ftp://ftp.bmc.com/pub/perform/resolutions/15063490.pdf; '\nname: BMC Software - Performance Assurance for Microsoft Servers\nport: 0\nvendor: BMC SOFTWARE\n"
  },
  {
    "path": "totalpass/payloads/cirt/bomgar/Enterprise.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Version: 10.4; Level: Administrator; '\nname: Bomgar - Enterprise\nport: 0\nvendor: BOMGAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/borland/Interbase.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: (blank)\n  - password: correct\n    username: politically\ncategory: unknown\ncomment: ''\nname: Borland - Interbase\nport: 0\nvendor: BORLAND\n"
  },
  {
    "path": "totalpass/payloads/cirt/breezecom/Breezecom Adapters.yml",
    "content": "auth:\n  credentials:\n  - password: laflaf\n    username: ''\n  - password: Master\n    username: ''\n  - password: Helpdesk\n    username: ''\n  - password: Super\n    username: ''\ncategory: unknown\ncomment: 'Version: 2.x; Level: Administrator; '\nname: Breezecom - Breezecom Adapters\nport: 0\nvendor: BREEZECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/breezecom/SA10.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: (blank)\ncategory: unknown\ncomment: ''\nname: Breezecom - SA10\nport: 0\nvendor: BREEZECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/brocade/Fabric OS.yml",
    "content": "auth:\n  credentials:\n  - password: fibranne\n    username: root\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: 3.x; Level: Administrator; '\nname: Brocade - Fabric OS\nport: 0\nvendor: BROCADE\n"
  },
  {
    "path": "totalpass/payloads/cirt/brocade/Silkworm.yml",
    "content": "auth:\n  credentials:\n  - password: brocade1\n    username: admin\ncategory: unknown\ncomment: 'Version: 300e; Level: Administrator; '\nname: Brocade - Silkworm\nport: 0\nvendor: BROCADE\n"
  },
  {
    "path": "totalpass/payloads/cirt/brother/ql580N.yml",
    "content": "auth:\n  credentials:\n  - password: access\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://welcome.solutions.brother.com/BSC/public/us/us_ot/en/faq/faqp/000000/001300/000093/faqp001393_000.html?reg=us&c=us_ot&lang=en&prod=lpql580eus&Cat=41; '\nname: Brother - ql580N\nport: 0\nvendor: BROTHER\n"
  },
  {
    "path": "totalpass/payloads/cirt/brother industries ltd/OCE Imagistics.yml",
    "content": "auth:\n  credentials:\n  - password: '12345678'\n    username: ''\n  - password: '00000000'\n    username: ''\ncategory: physical access\ncomment: 'Version: cm2520, cm4520, im6020, im7520; Level: Administrator; '\nname: Brother Industries Ltd. - OCE Imagistics\nport: 0\nvendor: BROTHER INDUSTRIES LTD.\n"
  },
  {
    "path": "totalpass/payloads/cirt/brother industries ltd/Oce.yml",
    "content": "auth:\n  credentials:\n  - password: access\n    username: admin\ncategory: unknown\ncomment: 'Version: fx3000; Level: Administrator; '\nname: Brother Industries Ltd. - Oce\nport: 0\nvendor: BROTHER INDUSTRIES LTD.\n"
  },
  {
    "path": "totalpass/payloads/cirt/bt/Home Hub.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: BT - Home Hub\nport: 0\nvendor: BT\n"
  },
  {
    "path": "totalpass/payloads/cirt/bt/Voyager 2000.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: BT - Voyager 2000\nport: 0\nvendor: BT\n"
  },
  {
    "path": "totalpass/payloads/cirt/bt/Voyager.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Version: 240; Level: Administrator; '\nname: BT - Voyager\nport: 0\nvendor: BT\n"
  },
  {
    "path": "totalpass/payloads/cirt/buffalo/melco/AirStation.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Buffalo/MELCO - AirStation\nport: 0\nvendor: BUFFALO/MELCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/busybox/Busybox.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Busybox - Busybox\nport: 0\nvendor: BUSYBOX\n"
  },
  {
    "path": "totalpass/payloads/cirt/cabletron/Netgear modem-router and SSR.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: netman\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cabletron - Netgear modem/router and SSR\nport: 0\nvendor: CABLETRON\n"
  },
  {
    "path": "totalpass/payloads/cirt/cabletron/routers - switches.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: unknown\ncomment: ''\nname: Cabletron - routers & switches\nport: 0\nvendor: CABLETRON\n"
  },
  {
    "path": "totalpass/payloads/cirt/capricorn infotech india/eToken Pro.yml",
    "content": "auth:\n  credentials:\n  - password: '1234567890'\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.isecurity.info/downloads/eToken_Basic_Operation_Guide_1.0.pdf; '\nname: Capricorn Infotech India - eToken Pro\nport: 0\nvendor: CAPRICORN INFOTECH INDIA\n"
  },
  {
    "path": "totalpass/payloads/cirt/carestream health/Spectrum.yml",
    "content": "auth:\n  credentials:\n  - password: DV5800\n    username: KeyOperator\n  - password: DV5800\n    username: LocalService\ncategory: http\ncomment: 'Level: Level 2; Doc: http://www.spectrumxray.com/sites/default/files/pdfs/Carestream-DryView-5800-5850.pdf; '\nname: CareStream Health - Spectrum\nport: 0\nvendor: CARESTREAM HEALTH\n"
  },
  {
    "path": "totalpass/payloads/cirt/carsten schmitz/LimeSurvey.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: 1.91; Level: Administrator; Doc: http://docs.limesurvey.org/Installation&structure=English+Instructions+for+LimeSurvey#Connect_to_the_administration_script_for_the_first_time; '\nname: Carsten Schmitz - LimeSurvey\nport: 0\nvendor: CARSTEN SCHMITZ\n"
  },
  {
    "path": "totalpass/payloads/cirt/cayman/DSL Router.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\n  - password: (serial number)\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cayman - DSL Router\nport: 0\nvendor: CAYMAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/ceragon networks/FibeAir.yml",
    "content": "auth:\n  credentials:\n  - password: tooridu\n    username: root\ncategory: multiple\ncomment: 'Version: IP-10C; Doc: http://www.kb.cert.org/vuls/id/936356; Notes: https://twitter.com/hdmoore/status/557653328533135360; '\nname: Ceragon Networks - FibeAir\nport: 0\nvendor: CERAGON NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/cgi world/Poll It.yml",
    "content": "auth:\n  credentials:\n  - password: protection\n    username: ''\ncategory: http\ncomment: 'Version: v2.0; Level: User/Admin over package; Notes: http://example.com/ScriptName.cgi?load=login; '\nname: CGI World - Poll It\nport: 0\nvendor: CGI WORLD\n"
  },
  {
    "path": "totalpass/payloads/cirt/chase research/Iolan.yml",
    "content": "auth:\n  credentials:\n  - password: iolan\n    username: (blank)\ncategory: unknown\ncomment: ''\nname: Chase Research - Iolan\nport: 0\nvendor: CHASE RESEARCH\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 210 - console.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: console\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 210 - console\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 210 - serial.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: serial\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 210 - serial\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 210.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 210\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 210N - console.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: console\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 210N - console\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 210N - serial.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: serial\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 210N - serial\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 210N.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 210N\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 410 - console.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: console\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 410 - console\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 410 - serial.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: serial\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 410 - serial\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 410.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 410\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 610 - console.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: console\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 610 - console\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 610 - serial.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: serial\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 610 - serial\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 610.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 610\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 610S - console.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: console\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 610S - console\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 610S - serial.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: serial\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 610S - serial\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/Interspect 610S.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Check Point - Interspect 610S\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/check point/SG R70.yml",
    "content": "auth:\n  credentials:\n  - password: adminadmin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: https://192.168.1.1/; '\nname: Check Point - SG R70\nport: 0\nvendor: CHECK POINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/chuming chen/NessusWeb.yml",
    "content": "auth:\n  credentials:\n  - password: adminpass\n    username: administrator\ncategory: http\ncomment: 'Level: Administrator; Notes: Located at /NessusWeb; '\nname: Chuming Chen - NessusWeb\nport: 0\nvendor: CHUMING CHEN\n"
  },
  {
    "path": "totalpass/payloads/cirt/ciphertrust/Ironmail.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Ciphertrust - Ironmail\nport: 0\nvendor: CIPHERTRUST\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/1100.yml",
    "content": "auth:\n  credentials:\n  - password: Cisco\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - 1100\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/1200.yml",
    "content": "auth:\n  credentials:\n  - password: Cisco\n    username: Cisco\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - 1200\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/1300.yml",
    "content": "auth:\n  credentials:\n  - password: Cisco\n    username: Cisco\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - 1300\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/1400.yml",
    "content": "auth:\n  credentials:\n  - password: Cisco\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - 1400\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/2600.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: Administrator\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Cisco - 2600\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/3600.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: Administrator\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Cisco - 3600\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/AIR-AP1231G-A-K9.yml",
    "content": "auth:\n  credentials:\n  - password: Cisco\n    username: Cisco\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default SSID is tsunami. User/pass are case\n  sensitive.; '\nname: Cisco - AIR-AP1231G-A-K9\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/AIRONET 1200.yml",
    "content": "auth:\n  credentials:\n  - password: Cisco\n    username: root\ncategory: http\ncomment: 'Level: Administrator; '\nname: Cisco - AIRONET 1200\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/AIRONET.yml",
    "content": "auth:\n  credentials:\n  - password: _Cisco\n    username: ''\n  - password: Cisco\n    username: Cisco\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Cisco - AIRONET\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/ATA 186.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - ATA 186\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/ATA-186 (VONAGE).yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; '\nname: Cisco - ATA-186 (VONAGE)\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/CACHE ENGINE.yml",
    "content": "auth:\n  credentials:\n  - password: diamond\n    username: admin\ncategory: console\ncomment: 'Level: Administrator; '\nname: Cisco - CACHE ENGINE\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/CISCO AP1200.yml",
    "content": "auth:\n  credentials:\n  - password: Cisco\n    username: Cisco\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Cisco - CISCO AP1200\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/CISO AIRONET 1100 SERIES.yml",
    "content": "auth:\n  credentials:\n  - password: Cisco\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; '\nname: Cisco - CISO AIRONET 1100 SERIES\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/CONTENT ENGINE.yml",
    "content": "auth:\n  credentials:\n  - password: default\n    username: admin\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Cisco - CONTENT ENGINE\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/CS-MARS.yml",
    "content": "auth:\n  credentials:\n  - password: pnadmin\n    username: pnadmin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Cisco - CS-MARS\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/CVA 122.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Cisco - CVA 122\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Catalyst Express 520.yml",
    "content": "auth:\n  credentials:\n  - password: cisco\n    username: cisco\ncategory: http\ncomment: 'Level: Administrator; Doc: https://www.cisco.com/en/US/docs/switches/lan/catalystexpress520/quick/start/gsgen.html; '\nname: Cisco - Catalyst Express 520\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Cisco Broadband Troubleshooter (CBT).yml",
    "content": "auth:\n  credentials:\n  - password: changeme\n    username: admin\ncategory: unknown\ncomment: ''\nname: Cisco - Cisco Broadband Troubleshooter (CBT)\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Cisco Guard.yml",
    "content": "auth:\n  credentials:\n  - password: riverhead\n    username: ''\ncategory: snmp\ncomment: 'Doc: http://www.cisco.com/en/US/products/ps5888/prod_release_note09186a0080237333.html; '\nname: Cisco - Cisco Guard\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Cisco IDS.yml",
    "content": "auth:\n  credentials:\n  - password: attack\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - Cisco IDS\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Cisco Unity.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: EAdmin\n  - password: ''\n    username: UNITY_\n  - password: ''\n    username: UAMIS_\n  - password: ''\n    username: UOMNI_\n  - password: ''\n    username: UVPIM_\n  - password: ''\n    username: ESubscriber\ncategory: unknown\ncomment: ''\nname: Cisco - Cisco Unity\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/CiscoWorks 2000.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: guest\n  - password: cisco\n    username: admin\ncategory: unknown\ncomment: 'Level: User; '\nname: Cisco - CiscoWorks 2000\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Codec.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Version: C40/C60; Level: Administrator; Doc: http://www.cisco.com/en/US/docs/telepresence/endpoint/profile-series/tc4/administration_guide/profile-c60-c40_and_codec-c60-c40_administrator_guide_tc41.pdf; '\nname: Cisco - Codec\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/ConfigMaker.yml",
    "content": "auth:\n  credentials:\n  - password: cmaker\n    username: cmaker\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - ConfigMaker\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/HSE.yml",
    "content": "auth:\n  credentials:\n  - password: hsadb\n    username: hsa\n  - password: blender\n    username: root\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Cisco - HSE\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/IDS.yml",
    "content": "auth:\n  credentials:\n  - password: attack\n    username: root\n  - password: cisco\n    username: cisco\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Cisco - IDS\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/IOS - snmp.yml",
    "content": "auth:\n  credentials:\n  - password: secret\n    username: private ReadWrite access\ncategory: snmp\ncomment: 'Level: Read-Write; '\nname: Cisco - IOS - snmp\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/IOS.yml",
    "content": "auth:\n  credentials:\n  - password: c\n    username: ''\n  - password: ''\n    username: ripeop\n  - password: cisco\n    username: cisco\n  - password: cisco\n    username: enable\n  - password: cc\n    username: ''\n  - password: cisco\n    username: ''\n  - password: Cisco router\n    username: ''\ncategory: multi\ncomment: 'Version: 2600 series; Notes: but these are common misconfigurations; '\nname: Cisco - IOS\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/IP Conference Station.yml",
    "content": "auth:\n  credentials:\n  - password: '7936'\n    username: End User\ncategory: http\ncomment: 'Version: 7936; '\nname: Cisco - IP Conference Station\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Modeling Labs.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: uwmadmin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.cisco.com/c/en/us/td/docs/cloud_services/cisco_modeling_labs/v100/installation/guide/administrator/b_cml_install_sys_admin/b_cml_install_sys_admin_chapter_0111.html;\n  Notes: User Workspace Management; '\nname: Cisco - Modeling Labs\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/NETRANGER-SECURE IDS.yml",
    "content": "auth:\n  credentials:\n  - password: attack\n    username: netrangr\n  - password: attack\n    username: root\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Cisco - NETRANGER/SECURE IDS\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Network Registrar (CNR).yml",
    "content": "auth:\n  credentials:\n  - password: changeme\n    username: admin\ncategory: unknown\ncomment: ''\nname: Cisco - Network Registrar (CNR)\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/PIX FIREWALL.yml",
    "content": "auth:\n  credentials:\n  - password: cisco\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Cisco - PIX FIREWALL\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/PIX.yml",
    "content": "auth:\n  credentials:\n  - password: cisco\n    username: ''\ncategory: telnet\ncomment: 'Level: UID = pix; '\nname: Cisco - PIX\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Traffic Anomaly Detector.yml",
    "content": "auth:\n  credentials:\n  - password: riverhead\n    username: ''\ncategory: snmp\ncomment: 'Doc: http://www.cisco.com/en/US/products/ps5888/prod_release_note09186a0080237333.html; '\nname: Cisco - Traffic Anomaly Detector\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Trailhead.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 4.0; Level: Administrator; '\nname: Cisco - Trailhead\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Unity.yml",
    "content": "auth:\n  credentials:\n  - password: (unknown)\n    username: bubba\ncategory: local\ncomment: 'Version: 1.3.2; Notes: Part numbers imprinted on the installation disks\n  with a local user account bubba, default RAID Manager address, and DHCP server address:80-7111-01\n  for the UNITY-SVRX255-1A80-7112-01 for the UNITY-SVRX255-2A; '\nname: Cisco - Unity\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/VPN 3000.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - VPN 3000\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/VPN 5000.yml",
    "content": "auth:\n  credentials:\n  - password: letmein\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco - VPN 5000\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/VPN CONCENTRATOR 3000 SERIES.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Cisco - VPN CONCENTRATOR 3000 SERIES\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/VPN3000.yml",
    "content": "auth:\n  credentials:\n  - password: changeit\n    username: ''\ncategory: unknown\ncomment: 'Level: JVM Key Store; Doc: http://160.78.48.20/vpn/software/How_to_use_Webvpn_with_Citrix_Metaframe.pdf;\n  Notes: The JVM certificate store is a file called \"cacerts\" and is located in ...libsecuritycacerts.; '\nname: Cisco - VPN3000\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/Video Surveillance Manager (VSM).yml",
    "content": "auth:\n  credentials:\n  - password: secur4u\n    username: root\ncategory: multiple\ncomment: 'Level: Administrator; Doc: http://www.cisco.com/c/en/us/td/docs/security/physical_security/video_surveillance/network/vsm/6_3/user_guide/cvsm_6_3/overview.html#wp1035089; '\nname: Cisco - Video Surveillance Manager (VSM)\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco/WLSE.yml",
    "content": "auth:\n  credentials:\n  - password: blender\n    username: root\n  - password: wlsedb\n    username: wlse\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Cisco - WLSE\nport: 0\nvendor: CISCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/cisco-arrowpoint/Arrowpoint.yml",
    "content": "auth:\n  credentials:\n  - password: system\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cisco-Arrowpoint - Arrowpoint\nport: 0\nvendor: CISCO-ARROWPOINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/citrix systems inc/Access Gateway - unknown.yml",
    "content": "auth:\n  credentials:\n  - password: nsroot\n    username: nsroot\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://support.citrix.com/proddocs/topic/access-gateway-hig-appliances/ag-using-setup-wizard-tsk.html; '\nname: Citrix Systems, Inc. - Access Gateway - unknown\nport: 0\nvendor: CITRIX SYSTEMS, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/citrix systems inc/Access Gateway.yml",
    "content": "auth:\n  credentials:\n  - password: rootadmin\n    username: root\ncategory: http\ncomment: 'Version: 4.6; Level: Administrator; '\nname: Citrix Systems, Inc. - Access Gateway\nport: 0\nvendor: CITRIX SYSTEMS, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/claris/At-Ease.yml",
    "content": "auth:\n  credentials:\n  - password: familymacintosh\n    username: ''\ncategory: unknown\ncomment: ''\nname: Claris - At-Ease\nport: 0\nvendor: CLARIS\n"
  },
  {
    "path": "totalpass/payloads/cirt/clearone communications/Converge Pro.yml",
    "content": "auth:\n  credentials:\n  - password: converge\n    username: clearone\ncategory: http\ncomment: 'Version: 880/840T/TH20/8i; Level: Administrator; Doc: http://pdf.textfiles.com/manuals/STARINMANUALS/ClearOne/Manuals/Archive/ConvergePro%208i,%20840T,%20880,%20TH20%20v0.91.pdf; '\nname: ClearOne Communications - Converge Pro\nport: 0\nvendor: CLEARONE COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/clearone communications/Converge.yml",
    "content": "auth:\n  credentials:\n  - password: RAV\n    username: ClearOne\ncategory: http\ncomment: 'Version: 560/590; Level: Administrator; Doc: http://www.clearone.com/uploads/resource/800_153_560_Rev1_0_Converge560_590Man-0.pdf; '\nname: ClearOne Communications - Converge\nport: 0\nvendor: CLEARONE COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/cobalt/RaQ Qube.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cobalt - RaQ Qube\nport: 0\nvendor: COBALT\n"
  },
  {
    "path": "totalpass/payloads/cirt/cobalt/Unknown.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cobalt - Unknown\nport: 0\nvendor: COBALT\n"
  },
  {
    "path": "totalpass/payloads/cirt/colubris networks/CN3200.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Colubris Networks - CN3200\nport: 0\nvendor: COLUBRIS NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/colubris networks/MSC 5100.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 5100; Level: Administrator; '\nname: Colubris Networks - MSC 5100\nport: 0\nvendor: COLUBRIS NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/comcast smc/8014.yml",
    "content": "auth:\n  credentials:\n  - password: highspeed\n    username: cusadmin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Comcast SMC - 8014\nport: 0\nvendor: COMCAST SMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/comersus/Shopping Cart.yml",
    "content": "auth:\n  credentials:\n  - password: dmr99\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Comersus - Shopping Cart\nport: 0\nvendor: COMERSUS\n"
  },
  {
    "path": "totalpass/payloads/cirt/comodo group inc/MyDLP.yml",
    "content": "auth:\n  credentials:\n  - password: mydlp\n    username: mydlp\ncategory: http\ncomment: 'Version: 2.0; Level: Administrator; Doc: https://www.mydlp.com/wp-content/uploads/Comodo_MyDLP_Admin_guide.pdf; '\nname: Comodo Group, Inc - MyDLP\nport: 0\nvendor: COMODO GROUP, INC\n"
  },
  {
    "path": "totalpass/payloads/cirt/compaq/Familiar Linux - console.yml",
    "content": "auth:\n  credentials:\n  - password: rootme\n    username: root\ncategory: console\ncomment: 'Level: Administrator; '\nname: Compaq - Familiar Linux - console\nport: 0\nvendor: COMPAQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/compaq/Familiar Linux - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: rootme\n    username: root\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Compaq - Familiar Linux - ssh\nport: 0\nvendor: COMPAQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/compaq/Familiar Linux.yml",
    "content": "auth:\n  credentials:\n  - password: rootme\n    username: root\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Compaq - Familiar Linux\nport: 0\nvendor: COMPAQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/compaq/Insight Manager.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: anonymous\n  - password: public\n    username: user\n  - password: operator\n    username: operator\n  - password: administrator\n    username: administrator\ncategory: unknown\ncomment: 'Level: User; '\nname: Compaq - Insight Manager\nport: 0\nvendor: COMPAQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/compaq/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Compaq\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Compaq - PC BIOS\nport: 0\nvendor: COMPAQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/compaq/WBEM.yml",
    "content": "auth:\n  credentials:\n  - password: administrator\n    username: administrator\ncategory: http\ncomment: 'Level: Administrator; Notes: Port 2301 for HTTP, 2381 for HTTPS.; '\nname: Compaq - WBEM\nport: 0\nvendor: COMPAQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/compualynx/Cmail Server.yml",
    "content": "auth:\n  credentials:\n  - password: asecret\n    username: administrator\ncategory: multi\ncomment: 'Version: All Versions; Level: Administrator; '\nname: Compualynx - Cmail Server\nport: 0\nvendor: COMPUALYNX\n"
  },
  {
    "path": "totalpass/payloads/cirt/compualynx/Cproxy Server.yml",
    "content": "auth:\n  credentials:\n  - password: asecret\n    username: administrator\ncategory: multi\ncomment: 'Version: All Versions; Level: Administrator; '\nname: Compualynx - Cproxy Server\nport: 0\nvendor: COMPUALYNX\n"
  },
  {
    "path": "totalpass/payloads/cirt/compualynx/SCM.yml",
    "content": "auth:\n  credentials:\n  - password: asecret\n    username: administrator\ncategory: multi\ncomment: 'Version: All Versions; Level: Administrator; '\nname: Compualynx - SCM\nport: 0\nvendor: COMPUALYNX\n"
  },
  {
    "path": "totalpass/payloads/cirt/conceptronic/C100BRS4H.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Conceptronic - C100BRS4H\nport: 0\nvendor: CONCEPTRONIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/conceptronic/CADSLR4 - ftp.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: anonymous\ncategory: ftp\ncomment: 'Level: Anonymous; Notes: Default IP 192.168.1.254; '\nname: Conceptronic - CADSLR4 - ftp\nport: 0\nvendor: CONCEPTRONIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/conceptronic/CADSLR4 - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: telnet\ncomment: 'Level: Administrator; Notes: Default IP 192.168.1.254; '\nname: Conceptronic - CADSLR4 - telnet\nport: 0\nvendor: CONCEPTRONIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/conceptronic/CADSLR4.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: Default IP 192.168.1.254; '\nname: Conceptronic - CADSLR4\nport: 0\nvendor: CONCEPTRONIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/concord/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: last\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Concord - PC BIOS\nport: 0\nvendor: CONCORD\n"
  },
  {
    "path": "totalpass/payloads/cirt/conexant/Router.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\n  - password: amigosw1\n    username: admin\n  - password: password\n    username: admin\n  - password: conexant\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Conexant - Router\nport: 0\nvendor: CONEXANT\n"
  },
  {
    "path": "totalpass/payloads/cirt/control4/Home Theater Controller AVMHTC1B.yml",
    "content": "auth:\n  credentials:\n  - password: ducati900ss\n    username: ''\n  - password: t0talc0ntr0l4!\n    username: root\ncategory: telnet\ncomment: 'Level: Administrator; Doc: http://www.digitalmunition.com/_/Blog/Entries/2010/10/13_Control4_gear_is_umm..._backdoored,_I_guess.html;\n  Notes: Port 5800. Password may also be ducati996.; '\nname: Control4 - Home Theater Controller AVMHTC1B\nport: 0\nvendor: CONTROL4\n"
  },
  {
    "path": "totalpass/payloads/cirt/coronamatrix/phpAddressBook.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 2.1; Level: Administrator; '\nname: CoronaMatrix - phpAddressBook\nport: 0\nvendor: CORONAMATRIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/covertix/SmartCipher.yml",
    "content": "auth:\n  credentials:\n  - password: Admin\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.kagoon.com/smartcipher-installation-guide-docx/main; '\nname: Covertix - SmartCipher\nport: 0\nvendor: COVERTIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/crystalview/OutsideView 32.yml",
    "content": "auth:\n  credentials:\n  - password: Crystal\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Crystalview - OutsideView 32\nport: 0\nvendor: CRYSTALVIEW\n"
  },
  {
    "path": "totalpass/payloads/cirt/ctx international/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: CTX_123\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: CTX International - PC BIOS\nport: 0\nvendor: CTX INTERNATIONAL\n"
  },
  {
    "path": "totalpass/payloads/cirt/cyberguard/Firewall.yml",
    "content": "auth:\n  credentials:\n  - password: cgadmin\n    username: cgadmin\ncategory: console\ncomment: 'Level: Administrator; '\nname: Cyberguard - Firewall\nport: 0\nvendor: CYBERGUARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/cybermax/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Congress\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: CyberMax - PC BIOS\nport: 0\nvendor: CYBERMAX\n"
  },
  {
    "path": "totalpass/payloads/cirt/cyberoam/Multiple.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://docs.cyberoam.com/; Notes: UTM, NGFW,\n  Virtual Appliance, Central Console; '\nname: Cyberoam - Multiple\nport: 0\nvendor: CYBEROAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/cyberoam/iView - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: root\ncategory: ssh\ncomment: 'Level: Administrator; Doc: https://docs.cyberoam.com/default.asp?id=344&Lang=1&SID=; '\nname: Cyberoam - iView - ssh\nport: 0\nvendor: CYBEROAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/cyberoam/iView.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://docs.cyberoam.com/default.asp?id=344&Lang=1&SID=; '\nname: Cyberoam - iView\nport: 0\nvendor: CYBEROAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/cyclades/Cyclades-TS800 - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: root\ncategory: ssh\ncomment: 'Version: TS800; Level: Administrator; '\nname: Cyclades - Cyclades-TS800 - ssh\nport: 0\nvendor: CYCLADES\n"
  },
  {
    "path": "totalpass/payloads/cirt/cyclades/Cyclades-TS800 - web.yml",
    "content": "auth:\n  credentials:\n  - password: tslinux\n    username: root\ncategory: web\ncomment: 'Version: TS800; Level: Administrator; '\nname: Cyclades - Cyclades-TS800 - web\nport: 0\nvendor: CYCLADES\n"
  },
  {
    "path": "totalpass/payloads/cirt/cyclades/Cyclades-TS800.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: root\ncategory: telnet\ncomment: 'Version: TS800; Level: Administrator; '\nname: Cyclades - Cyclades-TS800\nport: 0\nvendor: CYCLADES\n"
  },
  {
    "path": "totalpass/payloads/cirt/cyclades/PR-1000.yml",
    "content": "auth:\n  credentials:\n  - password: surt\n    username: super\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Cyclades - PR-1000\nport: 0\nvendor: CYCLADES\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/604.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: Admin\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: D-Link - 604\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/DCS-2121.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: root\ncategory: unknown\ncomment: 'Version: 1.04; Level: Administrator; Doc: http://newsoft-tech.blogspot.com/2010/09/d-link-dcs-2121-and-state-of-embedded.html; '\nname: D-Link - DCS-2121\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/DI-624.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: ''\nname: D-Link - DI-624\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/DI-824VUP Airplus G Wireless VPN Router.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: D-Link - DI-824VUP Airplus G Wireless VPN Router\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/DSL Router.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: D-Link - DSL Router\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/DSL-504.yml",
    "content": "auth:\n  credentials:\n  - password: private\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: D-Link - DSL-504\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/DSL-G664T.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: D-Link - DSL-G664T\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/Routers.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Version: DI-764; Level: Administrator; '\nname: D-Link - Routers\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/d-link/hubs-switches.yml",
    "content": "auth:\n  credentials:\n  - password: D-Link\n    username: D-Link\ncategory: telnet\ncomment: ''\nname: D-Link - hubs/switches\nport: 0\nvendor: D-LINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/daewoo/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Daewuu\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Daewoo - PC BIOS\nport: 0\nvendor: DAEWOO\n"
  },
  {
    "path": "totalpass/payloads/cirt/dallas semiconductors/TINI embedded JAVA Module.yml",
    "content": "auth:\n  credentials:\n  - password: tini\n    username: root\ncategory: telnet\ncomment: 'Version: <= 1.0; Level: Administrator; '\nname: Dallas Semiconductors - TINI embedded JAVA Module\nport: 0\nvendor: DALLAS SEMICONDUCTORS\n"
  },
  {
    "path": "totalpass/payloads/cirt/dassault systemes/Enovia V6.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: Test Everything\ncategory: unknown\ncomment: 'Doc: http://public.dhe.ibm.com/partnerworld/pub/whitepaper/193d6.pdf; '\nname: Dassault Systemes - Enovia V6\nport: 0\nvendor: DASSAULT SYSTEMES\n"
  },
  {
    "path": "totalpass/payloads/cirt/data general/AOS-VS.yml",
    "content": "auth:\n  credentials:\n  - password: operator\n    username: operator\n  - password: op\n    username: op\n  - password: operator\n    username: op\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Data General - AOS/VS\nport: 0\nvendor: DATA GENERAL\n"
  },
  {
    "path": "totalpass/payloads/cirt/datacom/BSASX-101.yml",
    "content": "auth:\n  credentials:\n  - password: letmein\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Datacom - BSASX/101\nport: 0\nvendor: DATACOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/datacom/NSBrowse.yml",
    "content": "auth:\n  credentials:\n  - password: sysadm\n    username: sysadm\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Datacom - NSBrowse\nport: 0\nvendor: DATACOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/datawizard technologies inc/FtpQX.yml",
    "content": "auth:\n  credentials:\n  - password: test\n    username: test\n  - password: ''\n    username: anonymous\ncategory: ftp\ncomment: 'Notes: The ''test'' user has READ and WRITE permissions on the C: drive\n  by default.; '\nname: DataWizard Technologies Inc. - FtpQX\nport: 0\nvendor: DATAWIZARD TECHNOLOGIES INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/davolink/DV2020.yml",
    "content": "auth:\n  credentials:\n  - password: user\n    username: user\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.zultrax.com/forward-port/davolink-dv-2020.htm;\n  Notes: Default LAN IP: 192.168.1.1; '\nname: Davolink - DV2020\nport: 0\nvendor: DAVOLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/daytek/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Daytec\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Daytek - PC BIOS\nport: 0\nvendor: DAYTEK\n"
  },
  {
    "path": "totalpass/payloads/cirt/debian/Linux LILO Default.yml",
    "content": "auth:\n  credentials:\n  - password: tatercounter2000\n    username: ''\ncategory: console\ncomment: 'Version: 2.2; Level: Administrator; '\nname: Debian - Linux LILO Default\nport: 0\nvendor: DEBIAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/deerfield/WorldClient and MDaemon.yml",
    "content": "auth:\n  credentials:\n  - password: MServer\n    username: MDaemon\ncategory: unknown\ncomment: 'Version: 5.0.5.0; Notes: Can be used to send/receive email remotely.; '\nname: Deerfield - WorldClient and MDaemon\nport: 0\nvendor: DEERFIELD\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/DRAC.yml",
    "content": "auth:\n  credentials:\n  - password: calvin\n    username: root\ncategory: multiple\ncomment: 'Level: Administrator; Notes: Can be accessed through HTTP(S), telnet and\n  ssh.; '\nname: Dell - DRAC\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/ERA.yml",
    "content": "auth:\n  credentials:\n  - password: calvin\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Embedded Remote Access; '\nname: Dell - ERA\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/Kace K2000.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.kace.com/support/kb/index.php?action=artikel&cat=60&id=864&artlang=en; '\nname: Dell - Kace K2000\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/Lattitude CMOS.yml",
    "content": "auth:\n  credentials:\n  - password: nz0u4bbe\n    username: ''\ncategory: unknown\ncomment: 'Version: CPi; Notes: enter password, then press control + enter.; '\nname: Dell - Lattitude CMOS\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Dell\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Dell - PC BIOS\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/PowerEdge NF100.yml",
    "content": "auth:\n  credentials:\n  - password: storageserver\n    username: Administrator\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dell - PowerEdge NF100\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/PowerVault.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: 136T; Level: Administrator; '\nname: Dell - PowerVault\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/Poweredge.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Version: 1655MC; Level: Administrator; '\nname: Dell - Poweredge\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/RAC.yml",
    "content": "auth:\n  credentials:\n  - password: calvin\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Remote Access Card; '\nname: Dell - RAC\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/Switch PowerConnect.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dell - Switch PowerConnect\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/TrueMobile.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Version: 2300; Level: Administrator; '\nname: Dell - TrueMobile\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/Winterm - bios.yml",
    "content": "auth:\n  credentials:\n  - password: Fireport\n    username: ''\ncategory: bios\ncomment: 'Level: Administrator; Doc: http://www.vennercorp.com/blog/2014/09/08/what-are-the-default-wyse-admin-passwords/; '\nname: Dell - Winterm - bios\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/Winterm - vnc.yml",
    "content": "auth:\n  credentials:\n  - password: winterm\n    username: VNC\ncategory: vnc\ncomment: 'Level: Administrator; Doc: http://www.vennercorp.com/blog/2014/09/08/what-are-the-default-wyse-admin-passwords/; '\nname: Dell - Winterm - vnc\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/Winterm.yml",
    "content": "auth:\n  credentials:\n  - password: wyse\n    username: root\ncategory: console\ncomment: 'Level: Administrator; Doc: http://www.vennercorp.com/blog/2014/09/08/what-are-the-default-wyse-admin-passwords/; '\nname: Dell - Winterm\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/dell/Wyse Rapport.yml",
    "content": "auth:\n  credentials:\n  - password: r@p8p0r+\n    username: rapport\ncategory: ftp\ncomment: 'Level: Administrator; Doc: http://www.vennercorp.com/blog/2014/09/08/what-are-the-default-wyse-admin-passwords/; '\nname: Dell - Wyse Rapport\nport: 0\nvendor: DELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/develcon/Orbitor Default Console.yml",
    "content": "auth:\n  credentials:\n  - password: BRIDGE\n    username: ''\n  - password: password\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Develcon - Orbitor Default Console\nport: 0\nvendor: DEVELCON\n"
  },
  {
    "path": "totalpass/payloads/cirt/dictaphone/ProLog.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: NETOP\n  - password: NETWORK\n    username: NETWORK\n  - password: PBX\n    username: PBX\ncategory: unknown\ncomment: ''\nname: Dictaphone - ProLog\nport: 0\nvendor: DICTAPHONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/digicorp/Viper.yml",
    "content": "auth:\n  credentials:\n  - password: BRIDGE\n    username: ''\n  - password: password\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Digicorp - Viper\nport: 0\nvendor: DIGICORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/digicraft software/Yak-.yml",
    "content": "auth:\n  credentials:\n  - password: asd123\n    username: Yak\ncategory: ftp\ncomment: 'Version: 2.0.1; Notes: Default port is 3535.; '\nname: Digicraft Software - Yak!\nport: 0\nvendor: DIGICRAFT SOFTWARE\n"
  },
  {
    "path": "totalpass/payloads/cirt/digital equipment/10-Dec.yml",
    "content": "auth:\n  credentials:\n  - password: syslib\n    username: '1'\n  - password: operator\n    username: '1'\n  - password: manager\n    username: '1'\n  - password: maintain\n    username: '2'\n  - password: syslib\n    username: '2'\n  - password: manager\n    username: '2'\n  - password: operator\n    username: '2'\n  - password: games\n    username: '30'\n  - password: games\n    username: '5'\n  - password: maintain\n    username: '7'\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Digital Equipment - 10-Dec\nport: 0\nvendor: DIGITAL EQUIPMENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/digital equipment/DEC-10.yml",
    "content": "auth:\n  credentials:\n  - password: syslib\n    username: '1'\n  - password: operator\n    username: '1'\n  - password: manager\n    username: '1'\n  - password: maintain\n    username: '2'\n  - password: syslib\n    username: '2'\n  - password: manager\n    username: '2'\n  - password: operator\n    username: '2'\n  - password: games\n    username: '30'\n  - password: games\n    username: '5'\n  - password: maintain\n    username: '7'\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Digital Equipment - DEC-10\nport: 0\nvendor: DIGITAL EQUIPMENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/digital equipment/DecServer.yml",
    "content": "auth:\n  credentials:\n  - password: ACCESS\n    username: ''\n  - password: SYSTEM\n    username: ''\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Digital Equipment - DecServer\nport: 0\nvendor: DIGITAL EQUIPMENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/digital equipment/IRIS.yml",
    "content": "auth:\n  credentials:\n  - password: accounting\n    username: accounting\n  - password: boss\n    username: boss\n  - password: demo\n    username: demo\n  - password: manager\n    username: manager\n  - password: PDP11\n    username: PDP11\n  - password: PDP8\n    username: PDP8\n  - password: software\n    username: software\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Digital Equipment - IRIS\nport: 0\nvendor: DIGITAL EQUIPMENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/digital equipment/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: komprie\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Digital Equipment - PC BIOS\nport: 0\nvendor: DIGITAL EQUIPMENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/digital equipment/RSX.yml",
    "content": "auth:\n  credentials:\n  - password: '1'\n    username: ''\n  - password: BATCH\n    username: BATCH\n  - password: MANAGER\n    username: SYSTEM\n  - password: SYSTEM\n    username: SYSTEM\n  - password: USER\n    username: USER\ncategory: multi\ncomment: 'Level: 1; '\nname: Digital Equipment - RSX\nport: 0\nvendor: DIGITAL EQUIPMENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/digital equipment/Terminal Server.yml",
    "content": "auth:\n  credentials:\n  - password: access\n    username: ''\n  - password: system\n    username: ''\ncategory: port 7000\ncomment: 'Level: User; '\nname: Digital Equipment - Terminal Server\nport: 0\nvendor: DIGITAL EQUIPMENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/digital equipment/VMS.yml",
    "content": "auth:\n  credentials:\n  - password: ALLIN1\n    username: ALLIN1\n  - password: ALLIN1MAIL\n    username: ALLIN1MAIL\n  - password: ALLINONE\n    username: ALLINONE\n  - password: BACKUP\n    username: BACKUP\n  - password: DCL\n    username: DCL\n  - password: DECMAIL\n    username: DECMAIL\n  - password: DECNET\n    username: DECNET\n  - password: NONPRIV\n    username: DECNET\n  - password: USER\n    username: DEFAULT\n  - password: DEFAULT\n    username: DEFAULT\n  - password: DEMO\n    username: DEMO\n  - password: FIELD\n    username: FIELD\n  - password: SERVICE\n    username: FIELD\n  - password: TEST\n    username: FIELD\n  - password: DIGITAL\n    username: FIELD\n  - password: GUEST\n    username: GUEST\n  - password: HELP\n    username: HELP\n  - password: HELPDESK\n    username: HELPDESK\n  - password: HOST\n    username: HOST\n  - password: INFO\n    username: INFO\n  - password: INGRES\n    username: INGRES\n  - password: LINK\n    username: LINK\n  - password: MAILER\n    username: MAILER\n  - password: MBMANAGER\n    username: MBMANAGER\n  - password: MBWATCH\n    username: MBWATCH\n  - password: NETCON\n    username: NETCON\n  - password: NETMGR\n    username: NETMGR\n  - password: NETNONPRIV\n    username: NETNONPRIV\n  - password: NETPRIV\n    username: NETPRIV\n  - password: NETSERVER\n    username: NETSERVER\n  - password: NETWORK\n    username: NETWORK\n  - password: NEWINGRES\n    username: NEWINGRES\n  - password: NEWS\n    username: NEWS\n  - password: OPERVAX\n    username: OPERVAX\n  - password: POSTMASTER\n    username: POSTMASTER\n  - password: PRIV\n    username: PRIV\n  - password: REPORT\n    username: REPORT\n  - password: RJE\n    username: RJE\n  - password: STUDENT\n    username: STUDENT\n  - password: SYS\n    username: SYS\n  - password: SYSMAINT\n    username: SYSMAINT\n  - password: SERVICE\n    username: SYSMAINT\n  - password: DIGITAL\n    username: SYSMAINT\n  - password: SYSTEM\n    username: SYSTEM\n  - password: MANAGER\n    username: SYSTEM\n  - password: OPERATOR\n    username: SYSTEM\n  - password: SYSLIB\n    username: SYSTEM\n  - password: UETP\n    username: SYSTEST\n  - password: SYSTEST_CLIG\n    username: SYSTEST_CLIG\n  - password: SYSTEST\n    username: SYSTEST_CLIG\n  - password: TELEDEMO\n    username: TELEDEMO\n  - password: TEST\n    username: TEST\n  - password: UETP\n    username: UETP\n  - password: PASSWORD\n    username: USER\n  - password: USERP\n    username: USERP\n  - password: VAX\n    username: VAX\n  - password: VMS\n    username: VMS\ncategory: multi\ncomment: ''\nname: Digital Equipment - VMS\nport: 0\nvendor: DIGITAL EQUIPMENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/digium inc/AsteriskNOW.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: ftp://ftp.gtlib.gatech.edu/pub/asterisknow/quickstart_asterisknow.pdf;\n  Notes: Only for Live CD or disk image.; '\nname: Digium, Inc. - AsteriskNOW\nport: 0\nvendor: DIGIUM, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/divar/XF.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\n  - password: ''\n    username: viewer\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.google.com/url?sa=t&source=web&cd=3&ved=0CBsQFjAC&url=http%3A%2F%2Fresource.boschsecurity.com%2Fdocuments%2FEX85MegapixelIP_TechnicalServiceNote_enUS_T6355740427.doc&ei=h55lTLeXCcT_lgfgkqyTDg&usg=AFQjCNGPOLSf4n0L9PAyJ8Jv7FFN0IDIVw; '\nname: Divar - XF\nport: 0\nvendor: DIVAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DI-614.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DI-614\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DI-624+.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DI-624+\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DI-624.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DI-624\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DSL-604+.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DSL-604+\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DSL-G604T.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DSL-G604T\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DWL-1000+.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DWL-1000+\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DWL-2000AP+.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DWL-2000AP+\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DWL-7000AP.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DWL-7000AP\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DWL-700AP.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DWL-700AP\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DWL-810+.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DWL-810+\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DWL-900+.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DWL-900+\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dlink/DWL-900.yml",
    "content": "auth:\n  credentials:\n  - password: public\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dlink - DWL-900\nport: 0\nvendor: DLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dotnetnuke corporation/DotNetNuke.yml",
    "content": "auth:\n  credentials:\n  - password: dnnhost\n    username: host\n  - password: dnnadmin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: DotNetNuke Corporation - DotNetNuke\nport: 0\nvendor: DOTNETNUKE CORPORATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/draytek/Vigor3300v.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: Draytek\ncategory: http\ncomment: 'Level: Administrator; '\nname: Draytek - Vigor3300v\nport: 0\nvendor: DRAYTEK\n"
  },
  {
    "path": "totalpass/payloads/cirt/draytek corp/Vigor2200USB.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Draytek Corp - Vigor2200USB\nport: 0\nvendor: DRAYTEK CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/draytek corp/Vigor2600 Plus Series Annex A.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Draytek Corp - Vigor2600 Plus Series Annex A\nport: 0\nvendor: DRAYTEK CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/ducati motor holding/Diavel.yml",
    "content": "auth:\n  credentials:\n  - password: Last 4 digits of VIN\n    username: ''\ncategory: console\ncomment: 'Version: 2011; Level: Rider; Doc: http://www.laresblog.com/2011/04/why-cant-i-just-buy-motorcycle-without.html; '\nname: Ducati Motor Holding - Diavel\nport: 0\nvendor: DUCATI MOTOR HOLDING\n"
  },
  {
    "path": "totalpass/payloads/cirt/dupont/Digital Water Proofer.yml",
    "content": "auth:\n  credentials:\n  - password: par0t\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: DuPont - Digital Water Proofer\nport: 0\nvendor: DUPONT\n"
  },
  {
    "path": "totalpass/payloads/cirt/dvb/DVstation - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: pixmet2003\n    username: root\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: DVB - DVstation - ssh\nport: 0\nvendor: DVB\n"
  },
  {
    "path": "totalpass/payloads/cirt/dvb/DVstation - vnc.yml",
    "content": "auth:\n  credentials:\n  - password: dvst10n\n    username: dvstation\ncategory: vnc\ncomment: 'Level: Administrator; '\nname: DVB - DVstation - vnc\nport: 0\nvendor: DVB\n"
  },
  {
    "path": "totalpass/payloads/cirt/dvb/DVstation.yml",
    "content": "auth:\n  credentials:\n  - password: dvst10n\n    username: dvstation\ncategory: http\ncomment: 'Level: Administrator; '\nname: DVB - DVstation\nport: 0\nvendor: DVB\n"
  },
  {
    "path": "totalpass/payloads/cirt/dynalink/RTA230.yml",
    "content": "auth:\n  credentials:\n  - password: userNotU\n    username: userNotUsed\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Dynalink - RTA230\nport: 0\nvendor: DYNALINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/dynix library systems/Dynix.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: circ\n  - password: ''\n    username: LIBRARY\n  - password: ''\n    username: SETUP\ncategory: multi\ncomment: 'Level: User; '\nname: Dynix Library Systems - Dynix\nport: 0\nvendor: DYNIX LIBRARY SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/eaton/Network Shutdown Module.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Eaton - Network Shutdown Module\nport: 0\nvendor: EATON\n"
  },
  {
    "path": "totalpass/payloads/cirt/eaton/ePDU.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Eaton - ePDU\nport: 0\nvendor: EATON\n"
  },
  {
    "path": "totalpass/payloads/cirt/echelon corporation/i.LON Multiple.yml",
    "content": "auth:\n  credentials:\n  - password: ilon\n    username: ilon\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Echelon Corporation - i.LON Multiple\nport: 0\nvendor: ECHELON CORPORATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/edimax/7205APL.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: guest\ncategory: unknown\ncomment: 'Notes: Allows backup of config.bin which contains all system passwords.; '\nname: Edimax - 7205APL\nport: 0\nvendor: EDIMAX\n"
  },
  {
    "path": "totalpass/payloads/cirt/edimax/AR-6004.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: ''\nname: Edimax - AR-6004\nport: 0\nvendor: EDIMAX\n"
  },
  {
    "path": "totalpass/payloads/cirt/edimax/AR-7024Wg.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 10.0.0.2; '\nname: Edimax - AR-7024Wg\nport: 0\nvendor: EDIMAX\n"
  },
  {
    "path": "totalpass/payloads/cirt/edimax/BR-6204WG.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.1; '\nname: Edimax - BR-6204WG\nport: 0\nvendor: EDIMAX\n"
  },
  {
    "path": "totalpass/payloads/cirt/edimax/BR-7209WG.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.1; '\nname: Edimax - BR-7209WG\nport: 0\nvendor: EDIMAX\n"
  },
  {
    "path": "totalpass/payloads/cirt/edimax/DI-524.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.0.1; '\nname: Edimax - DI-524\nport: 0\nvendor: EDIMAX\n"
  },
  {
    "path": "totalpass/payloads/cirt/efficient/Speedstream - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: superuser\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Efficient - Speedstream - telnet\nport: 0\nvendor: EFFICIENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/efficient/Speedstream DSL.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Efficient - Speedstream DSL\nport: 0\nvendor: EFFICIENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/efficient/Speedstream.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\n  - password: ''\n    username: ''\n  - password: admin\n    username: login\n  - password: admin\n    username: superuser\ncategory: http\ncomment: 'Version: 5200; Notes: Default IP 10.0.0.1/8; '\nname: Efficient - Speedstream\nport: 0\nvendor: EFFICIENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/ektron inc/CMS400.NET - sql.yml",
    "content": "auth:\n  credentials:\n  - password: Ektron\n    username: sa\ncategory: sql\ncomment: 'Level: Administrator; Doc: http://downloads2.ektron.com/software/released/CMS400/v48/SetupManual.pdf; '\nname: Ektron, Inc. - CMS400.NET - sql\nport: 0\nvendor: EKTRON, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/ektron inc/CMS400.NET.yml",
    "content": "auth:\n  credentials:\n  - password: builtin\n    username: builtin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://dev.ektron.com/kb_article.aspx?id=1818; '\nname: Ektron, Inc. - CMS400.NET\nport: 0\nvendor: EKTRON, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/elron/Firewall.yml",
    "content": "auth:\n  credentials:\n  - password: sysadmin\n    username: (hostname/ipaddress)\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Elron - Firewall\nport: 0\nvendor: ELRON\n"
  },
  {
    "path": "totalpass/payloads/cirt/elsa/LANCom Office ISDN Router.yml",
    "content": "auth:\n  credentials:\n  - password: cisco\n    username: ''\n  - password: ''\n    username: ''\ncategory: telnet\ncomment: 'Version: 800/1000/1100; Level: Administrator; '\nname: Elsa - LANCom Office ISDN Router\nport: 0\nvendor: ELSA\n"
  },
  {
    "path": "totalpass/payloads/cirt/emc/Avamar Deduplication Backup Server - postgresql.yml",
    "content": "auth:\n  credentials:\n  - password: viewuser1\n    username: viewuser\ncategory: postgresql\ncomment: 'Level: View; Doc: https://community.emc.com/message/525389; '\nname: EMC - Avamar Deduplication Backup Server - postgresql\nport: 0\nvendor: EMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/emc/Avamar Deduplication Backup Server - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: changeme\n    username: dpn\ncategory: ssh\ncomment: 'Level: Administrator; Doc: https://community.emc.com/message/525389; '\nname: EMC - Avamar Deduplication Backup Server - ssh\nport: 0\nvendor: EMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/emc/Avamar Deduplication Backup Server.yml",
    "content": "auth:\n  credentials:\n  - password: MCUser1\n    username: MCUser\n  - password: backuponly1\n    username: backuponly\n  - password: restoreonly1\n    username: restoreonly\n  - password: backuprestore1\n    username: backuprestore\n  - password: 8RttoTriz\n    username: root\ncategory: http\ncomment: 'Level: Administrator; Doc: https://community.emc.com/message/525389; '\nname: EMC - Avamar Deduplication Backup Server\nport: 0\nvendor: EMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/eminent/EM4114.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Eminent - EM4114\nport: 0\nvendor: EMINENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/enhydra/Multiserver.yml",
    "content": "auth:\n  credentials:\n  - password: enhydra\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Enhydra - Multiserver\nport: 0\nvendor: ENHYDRA\n"
  },
  {
    "path": "totalpass/payloads/cirt/enox/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: xo11nE\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Enox - PC BIOS\nport: 0\nvendor: ENOX\n"
  },
  {
    "path": "totalpass/payloads/cirt/enterasys/SecureStack A2.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: console\ncomment: 'Level: Administrator; Doc: http://secure.enterasys.com/support/manuals/hardware/A2_QuickStart.pdf; '\nname: Enterasys - SecureStack A2\nport: 0\nvendor: ENTERASYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/entrust/Get Access Service Control Agent.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 4.x; Level: Administrator; '\nname: Entrust - Get Access Service Control Agent\nport: 0\nvendor: ENTRUST\n"
  },
  {
    "path": "totalpass/payloads/cirt/episerver ab/EPiServer Commerce.yml",
    "content": "auth:\n  credentials:\n  - password: store\n    username: admin\ncategory: http\ncomment: 'Version: 1.0; Level: Administrator; Doc: http://world.episerver.com/Documentation/Items/Installation-Instructions/EPiServer-Commerce/Installation-Instructions---EPiServer-Commerce/#First%20Time%20Login; '\nname: EPiServer AB - EPiServer Commerce\nport: 0\nvendor: EPISERVER AB\n"
  },
  {
    "path": "totalpass/payloads/cirt/epox/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: central\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Epox - PC BIOS\nport: 0\nvendor: EPOX\n"
  },
  {
    "path": "totalpass/payloads/cirt/eq-3/HomeMatic.yml",
    "content": "auth:\n  credentials:\n  - password: MuZhlo9n%8!G\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Notes: CCU2; '\nname: eQ-3 - HomeMatic\nport: 0\nvendor: EQ-3\n"
  },
  {
    "path": "totalpass/payloads/cirt/ericsson/Ericsson Acc.yml",
    "content": "auth:\n  credentials:\n  - password: netman\n    username: netman\ncategory: unknown\ncomment: ''\nname: Ericsson - Ericsson Acc\nport: 0\nvendor: ERICSSON\n"
  },
  {
    "path": "totalpass/payloads/cirt/esesix computer gmbh/Thintune.yml",
    "content": "auth:\n  credentials:\n  - password: jstwo\n    username: root\ncategory: unknown\ncomment: 'Version: 2.4.38-32-D; Level: Administrator; Notes: Connecting on port 25072.; '\nname: eSeSIX Computer GmbH - Thintune\nport: 0\nvendor: ESESIX COMPUTER GMBH\n"
  },
  {
    "path": "totalpass/payloads/cirt/exabyte/Mag20.yml",
    "content": "auth:\n  credentials:\n  - password: Exabyte\n    username: anonymous\ncategory: ftp\ncomment: 'Doc: http://www.exabyte.com/support/products/tad-getmanual.cfm?id=723; '\nname: Exabyte - Mag20\nport: 0\nvendor: EXABYTE\n"
  },
  {
    "path": "totalpass/payloads/cirt/exacq technologies/NVR Server.yml",
    "content": "auth:\n  credentials:\n  - password: admin256\n    username: admin\n  - password: user5710\n    username: user\ncategory: http\ncomment: 'Level: Administrator; Doc: http://d1ni7hpbick8ut.cloudfront.net/ev-desktop-IP-quickstart-0309.pdf; '\nname: Exacq Technologies - NVR Server\nport: 0\nvendor: EXACQ TECHNOLOGIES\n"
  },
  {
    "path": "totalpass/payloads/cirt/exinda networks/1700.yml",
    "content": "auth:\n  credentials:\n  - password: exinda\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default Login: http://172.14.1.57/; '\nname: Exinda Networks - 1700\nport: 0\nvendor: EXINDA NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/extended systems/Firewall.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Extended Systems - Firewall\nport: 0\nvendor: EXTENDED SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/extended systems/Print Server.yml",
    "content": "auth:\n  credentials:\n  - password: extendnet\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Extended Systems - Print Server\nport: 0\nvendor: EXTENDED SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/extreme networks/Alpine.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Extreme Networks - Alpine\nport: 0\nvendor: EXTREME NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/extreme networks/BlackDiamond.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Extreme Networks - BlackDiamond\nport: 0\nvendor: EXTREME NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/extreme networks/Summit.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Extreme Networks - Summit\nport: 0\nvendor: EXTREME NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/ez systems/eZ Publish.yml",
    "content": "auth:\n  credentials:\n  - password: publish\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://doc.ez.no/eZ-Publish/User-manual/4.x/The-administration-interface/The-login-page; '\nname: eZ Systems - eZ Publish\nport: 0\nvendor: EZ SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/ezphotosales/EZPhotoSales.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: EZPhotoSales - EZPhotoSales\nport: 0\nvendor: EZPHOTOSALES\n"
  },
  {
    "path": "totalpass/payloads/cirt/f5/BIG-IP - http.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 9.12; Level: Administrator; '\nname: F5 - BIG-IP - http\nport: 0\nvendor: F5\n"
  },
  {
    "path": "totalpass/payloads/cirt/f5/BIG-IP.yml",
    "content": "auth:\n  credentials:\n  - password: default\n    username: root\n  - password: ''\n    username: support\ncategory: unknown\ncomment: 'Version: 450; Level: Administrator; '\nname: F5 - BIG-IP\nport: 0\nvendor: F5\n"
  },
  {
    "path": "totalpass/payloads/cirt/fastream technologies/Fastream IQ Web-FTP Server.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Admin interface runs on port 30000 by default.; '\nname: Fastream Technologies - Fastream IQ Web/FTP Server\nport: 0\nvendor: FASTREAM TECHNOLOGIES\n"
  },
  {
    "path": "totalpass/payloads/cirt/fastwire/Fastwire Bank Transfer.yml",
    "content": "auth:\n  credentials:\n  - password: fw\n    username: fastwire\ncategory: unknown\ncomment: ''\nname: Fastwire - Fastwire Bank Transfer\nport: 0\nvendor: FASTWIRE\n"
  },
  {
    "path": "totalpass/payloads/cirt/fatwire/Analytics.yml",
    "content": "auth:\n  credentials:\n  - password: xceladmin\n    username: fwadmin\n  - password: firstsite\n    username: firstsite\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.vvgr.demon.co.uk/FatWire_Analytics.pdf; '\nname: FatWire - Analytics\nport: 0\nvendor: FATWIRE\n"
  },
  {
    "path": "totalpass/payloads/cirt/firebird project/Firebird.yml",
    "content": "auth:\n  credentials:\n  - password: masterkey\n    username: SYSDBA\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Firebird Project - Firebird\nport: 0\nvendor: FIREBIRD PROJECT\n"
  },
  {
    "path": "totalpass/payloads/cirt/flowpoint/DSL.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: password\n    username: ''\ncategory: telnet\ncomment: 'Version: 2000; Level: Administrator; '\nname: Flowpoint - DSL\nport: 0\nvendor: FLOWPOINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/flowpoint/Flowpoint-2000 ADSL.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Flowpoint - Flowpoint/2000 ADSL\nport: 0\nvendor: FLOWPOINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/fortinet/FortiGate.yml",
    "content": "auth:\n  credentials:\n  - password: pbcpbn(add-serial-number)\n    username: maintainer\n  - password: bcpb(serial number of the firewall)\n    username: ''\ncategory: serial console\ncomment: 'Level: Administrator; Notes: You must have physical access to the system.; '\nname: Fortinet - FortiGate\nport: 0\nvendor: FORTINET\n"
  },
  {
    "path": "totalpass/payloads/cirt/foscam/FI8918-FI8918W.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://foscam.com/Private/ProductFiles/FI8918W%20user%20manual-v36.00.pdf; '\nname: Foscam - FI8918/FI8918W\nport: 0\nvendor: FOSCAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/foundry networks/ServerIron.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: (blank)\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Foundry Networks - ServerIron\nport: 0\nvendor: FOUNDRY NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/freetech/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Posterie\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Freetech - PC BIOS\nport: 0\nvendor: FREETECH\n"
  },
  {
    "path": "totalpass/payloads/cirt/frontrange solutions/GoldMine Software.yml",
    "content": "auth:\n  credentials:\n  - password: access\n    username: master\ncategory: unknown\ncomment: ''\nname: FrontRange Solutions - GoldMine Software\nport: 0\nvendor: FRONTRANGE SOLUTIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/funk software/Steel Belted Radius.yml",
    "content": "auth:\n  credentials:\n  - password: radius\n    username: admin\ncategory: unknown\ncomment: 'Version: 450; Level: Administrator; '\nname: Funk Software - Steel Belted Radius\nport: 0\nvendor: FUNK SOFTWARE\n"
  },
  {
    "path": "totalpass/payloads/cirt/galacticomm/Major BBS.yml",
    "content": "auth:\n  credentials:\n  - password: Sysop\n    username: Sysop\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Galacticomm - Major BBS\nport: 0\nvendor: GALACTICOMM\n"
  },
  {
    "path": "totalpass/payloads/cirt/gandalf/XMUX.yml",
    "content": "auth:\n  credentials:\n  - password: gandalf\n    username: ''\n  - password: console\n    username: ''\n  - password: system\n    username: ''\n  - password: xmux\n    username: ''\ncategory: unknown\ncomment: 'Notes: Also found on XMUX''s are the Logger and Machine LCN''s. Use ports\n  2 and 3 respectively to reach these. Note: only seen these on Datapac, and other\n  X.2X networks.; '\nname: Gandalf - XMUX\nport: 0\nvendor: GANDALF\n"
  },
  {
    "path": "totalpass/payloads/cirt/gateway/WGR-200.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Gateway - WGR-200\nport: 0\nvendor: GATEWAY\n"
  },
  {
    "path": "totalpass/payloads/cirt/gateway/WGR-250.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Gateway - WGR-250\nport: 0\nvendor: GATEWAY\n"
  },
  {
    "path": "totalpass/payloads/cirt/ge security inc/Integrated Configuration Tool.yml",
    "content": "auth:\n  credentials:\n  - password: install\n    username: install\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.qdigital.us/soporte/CasiRusco/Casirusco-documentation/controllers/460972001B.pdf; '\nname: GE Security, Inc. - Integrated Configuration Tool\nport: 0\nvendor: GE SECURITY, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/geeklog/Geeklog.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: username\ncategory: mysql\ncomment: 'Version: 1.3.x; '\nname: Geeklog - Geeklog\nport: 0\nvendor: GEEKLOG\n"
  },
  {
    "path": "totalpass/payloads/cirt/general instruments/Cable Modem.yml",
    "content": "auth:\n  credentials:\n  - password: test\n    username: test\ncategory: unknown\ncomment: ''\nname: General Instruments - Cable Modem\nport: 0\nvendor: GENERAL INSTRUMENTS\n"
  },
  {
    "path": "totalpass/payloads/cirt/glftpd/glFtpD.yml",
    "content": "auth:\n  credentials:\n  - password: glftpd\n    username: glftpd\ncategory: console\ncomment: 'Version: all; Level: Administrator; '\nname: glFtpD - glFtpD\nport: 0\nvendor: GLFTPD\n"
  },
  {
    "path": "totalpass/payloads/cirt/globespan virata/GS8100.yml",
    "content": "auth:\n  credentials:\n  - password: DSL\n    username: DSL\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Globespan Virata - GS8100\nport: 0\nvendor: GLOBESPAN VIRATA\n"
  },
  {
    "path": "totalpass/payloads/cirt/google/Urchin.yml",
    "content": "auth:\n  credentials:\n  - password: urchin\n    username: admin\ncategory: https\ncomment: 'Level: Administrator; '\nname: Google - Urchin\nport: 0\nvendor: GOOGLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/gossamer threads inc/DBMan.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: author\n    username: author\n  - password: guest\n    username: guest\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Gossamer Threads Inc. - DBMan\nport: 0\nvendor: GOSSAMER THREADS INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/grandstream/HandyTone 286-386-GXP-2000 VoIP Analog Telephone Adaptor.yml",
    "content": "auth:\n  credentials:\n  - password: 123 (or blank)\n    username: End User\n  - password: admin\n    username: Administrator\ncategory: http\ncomment: ''\nname: GrandStream - HandyTone 286/386/GXP-2000 VoIP Analog Telephone Adaptor\nport: 0\nvendor: GRANDSTREAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/grandstream/HandyTone 486-488-496 VoIP Analog Telephone Adaptor.yml",
    "content": "auth:\n  credentials:\n  - password: 123 (or blank)\n    username: End User\n  - password: admin\n    username: Administrator\ncategory: http\ncomment: 'Level: Administrator; '\nname: GrandStream - HandyTone 486/488/496 VoIP Analog Telephone Adaptor\nport: 0\nvendor: GRANDSTREAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/grandstream/HandyTone Budgetone-100 IP Phone.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; '\nname: GrandStream - HandyTone Budgetone-100 IP Phone\nport: 0\nvendor: GRANDSTREAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/grandstream networks inc/HandyTone-486.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: '123'\n    username: End User\ncategory: http\ncomment: 'Version: 1.1.0.31; Level: Administrator; Doc: http://www.grandstream.com/user_manuals/HandyTone-486UserManual.pdf; '\nname: Grandstream Networks, Inc - HandyTone-486\nport: 0\nvendor: GRANDSTREAM NETWORKS, INC\n"
  },
  {
    "path": "totalpass/payloads/cirt/groupee inc/Ultimate Bulletin Board.yml",
    "content": "auth:\n  credentials:\n  - password: 4tugboat\n    username: Admin5\ncategory: http\ncomment: 'Level: Administrator; Notes: UBB; '\nname: Groupee, Inc. - Ultimate Bulletin Board\nport: 0\nvendor: GROUPEE, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/guardone/BizGuard.yml",
    "content": "auth:\n  credentials:\n  - password: guardone\n    username: n.a\ncategory: multi\ncomment: 'Level: Administrator; '\nname: GuardOne - BizGuard\nport: 0\nvendor: GUARDONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/guardone/Restrictor.yml",
    "content": "auth:\n  credentials:\n  - password: guardone\n    username: ''\ncategory: multi\ncomment: 'Level: Administrator; '\nname: GuardOne - Restrictor\nport: 0\nvendor: GUARDONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/h2o project/Medialibrary.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: H2O Project - Medialibrary\nport: 0\nvendor: H2O PROJECT\n"
  },
  {
    "path": "totalpass/payloads/cirt/hayes/Century.yml",
    "content": "auth:\n  credentials:\n  - password: isp\n    username: system\ncategory: unknown\ncomment: 'Version: MR200; Level: Administrator; '\nname: Hayes - Century\nport: 0\nvendor: HAYES\n"
  },
  {
    "path": "totalpass/payloads/cirt/hemoco software/Lansweeper.yml",
    "content": "auth:\n  credentials:\n  - password: mysecretpassword0*\n    username: lansweeperuser\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.lansweeper.com/documentation.pdf; '\nname: Hemoco Software - Lansweeper\nport: 0\nvendor: HEMOCO SOFTWARE\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/HP 2000-3000 MPE-xx.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ADVMAIL\n  - password: HP\n    username: ADVMAIL\n  - password: SUPPORT\n    username: FIELD\n  - password: MGR\n    username: FIELD\n  - password: SERVICE\n    username: FIELD\n  - password: MANAGER\n    username: FIELD\n  - password: ''\n    username: FIELD\n  - password: LOTUS\n    username: FIELD\n  - password: ''\n    username: FIELD\n  - password: HPONLY\n    username: FIELD\n  - password: MANAGER.SYS\n    username: HELLO\n  - password: MGR.SYS\n    username: HELLO\n  - password: FIELD.SUPPORT\n    username: HELLO\n  - password: OP.OPERATOR\n    username: HELLO\n  - password: MAIL\n    username: MAIL\n  - password: REMOTE\n    username: MAIL\n  - password: TELESUP\n    username: MAIL\n  - password: HPOFFICE\n    username: MAIL\n  - password: MPE\n    username: MAIL\n  - password: TCH\n    username: MANAGER\n  - password: SYS\n    username: MANAGER\n  - password: SECURITY\n    username: MANAGER\n  - password: ITF3000\n    username: MANAGER\n  - password: HPOFFICE\n    username: MANAGER\n  - password: COGNOS\n    username: MANAGER\n  - password: TELESUP\n    username: MANAGER\n  - password: VESOFT\n    username: MGE\n  - password: SYS\n    username: MGR\n  - password: CAROLIAN\n    username: MGR\n  - password: VESOFT\n    username: MGR\n  - password: XLSERVER\n    username: MGR\n  - password: SECURITY\n    username: MGR\n  - password: TELESUP\n    username: MGR\n  - password: HPDESK\n    username: MGR\n  - password: CCC\n    username: MGR\n  - password: CNAS\n    username: MGR\n  - password: WORD\n    username: MGR\n  - password: COGNOS\n    username: MGR\n  - password: ROBELLE\n    username: MGR\n  - password: HPOFFICE\n    username: MGR\n  - password: HPONLY\n    username: MGR\n  - password: HPP187\n    username: MGR\n  - password: HPP189\n    username: MGR\n  - password: HPP196\n    username: MGR\n  - password: INTX3\n    username: MGR\n  - password: ITF3000\n    username: MGR\n  - password: NETBASE\n    username: MGR\n  - password: REGO\n    username: MGR\n  - password: RJE\n    username: MGR\n  - password: CONV\n    username: MGR\n  - password: SYS\n    username: OPERATOR\n  - password: DISC\n    username: OPERATOR\n  - password: SYSTEM\n    username: OPERATOR\n  - password: SUPPORT\n    username: OPERATOR\n  - password: COGNOS\n    username: OPERATOR\n  - password: SYS\n    username: PCUSER\n  - password: SYS\n    username: RSBCMON\n  - password: HPOFFICE\n    username: SPOOLMAN\n  - password: HPOFFICE\n    username: WP\ncategory: multi\ncomment: 'Level: HPOFFICE; Notes: DATA; '\nname: Hewlett-Packard - HP 2000/3000 MPE/xx\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/HP-UX Web Server Suite.yml",
    "content": "auth:\n  credentials:\n  - password: hp.com\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Hewlett-Packard - HP-UX Web Server Suite\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/Motive Chrous.yml",
    "content": "auth:\n  credentials:\n  - password: isee\n    username: admin\ncategory: http\ncomment: 'Notes: Port 5060; '\nname: Hewlett-Packard - Motive Chrous\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/ProcCurve MSC-5100.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: multiple\ncomment: 'Level: Administrator; Doc: http://www.google.com/url?sa=t&source=web&cd=1&sqi=2&ved=0CBgQFjAA&url=http%3A%2F%2Fcdn.procurve.com%2Ftraining%2FManuals%2Fr52%2F42-10-5100-02_QS_MSC-5100_en.pdf&ei=b1DkTZ7HBInQgAfwzPDCBg&usg=AFQjCNEPTe_QUv1bf17RCW-0wYwrJmS24g; '\nname: Hewlett-Packard - ProcCurve MSC-5100\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/Remote Insight Board.yml",
    "content": "auth:\n  credentials:\n  - password: The last eight digits of the serial number\n    username: Administrator\ncategory: http\ncomment: 'Level: Administrator; Doc: http://bizsupport1.austin.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01141537&lang=en&cc=us&taskId=101&prodSeriesId=428936&prodTypeId=15351;\n  Notes: RILOE II; '\nname: Hewlett-Packard - Remote Insight Board\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/StoreOnce.yml",
    "content": "auth:\n  credentials:\n  - password: badg3r5\n    username: HPSupport\ncategory: ssh\ncomment: 'Level: Administrator; Doc: http://www.lolware.net/hpstorage.html; Notes:\n  Also known as HP D2D. More info: http://www.securityweek.com/hp-confirms-backdoor-storeonce-backup-product-line; '\nname: Hewlett-Packard - StoreOnce\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/Vectra.yml",
    "content": "auth:\n  credentials:\n  - password: hewlpack\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Hewlett-Packard - Vectra\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/Webmin.yml",
    "content": "auth:\n  credentials:\n  - password: hp.com\n    username: admin\ncategory: http\ncomment: 'Version: 0.84; Level: Administrator; Notes: Runs on port 1000.; '\nname: Hewlett-Packard - Webmin\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/hewlett-packard/iLo.yml",
    "content": "auth:\n  credentials:\n  - password: Admin\n    username: Admin\n  - password: Oper\n    username: Oper\ncategory: http\ncomment: 'Level: Administrator; '\nname: Hewlett-Packard - iLo\nport: 0\nvendor: HEWLETT-PACKARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/highpoint/RAID Management Utilities.yml",
    "content": "auth:\n  credentials:\n  - password: hpt\n    username: RAID\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.hptmac.com/image/PDF/RAID_Managment_Software_Download.pdf;\n  Notes: http://127.0.0.1:7412; '\nname: HighPOint - RAID Management Utilities\nport: 0\nvendor: HIGHPOINT\n"
  },
  {
    "path": "totalpass/payloads/cirt/hitachi systems/Compute Kit (Vantara).yml",
    "content": "auth:\n  credentials:\n  - password: cepasswd\n    username: ceconsl\ncategory: http\ncomment: 'Level: Administrator; Doc: https://dukeyen.wordpress.com/tag/hitachi-vantara/; '\nname: Hitachi Systems - Compute Kit (Vantara)\nport: 0\nvendor: HITACHI SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/hitachi systems/HiTrack.yml",
    "content": "auth:\n  credentials:\n  - password: hds\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Hitachi Systems - HiTrack\nport: 0\nvendor: HITACHI SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/hitachi systems/Multiple (Device Manager, Tuning Manager, Storage Manager).yml",
    "content": "auth:\n  credentials:\n  - password: manager\n    username: system\ncategory: http\ncomment: 'Level: Administrator; Doc: https://community.hitachivantara.com/thread/1829; '\nname: Hitachi Systems - Multiple (Device Manager, Tuning Manager, Storage Manager)\nport: 0\nvendor: HITACHI SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/hitachi systems/Storage Manager.yml",
    "content": "auth:\n  credentials:\n  - password: storage\n    username: root\ncategory: ssh\ncomment: 'Level: Administrator; Doc: https://community.hitachivantara.com/thread/1829; '\nname: Hitachi Systems - Storage Manager\nport: 0\nvendor: HITACHI SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/honeynet project/Honeywall.yml",
    "content": "auth:\n  credentials:\n  - password: honey\n    username: root\n  - password: honey\n    username: roo\ncategory: console\ncomment: 'Version: roo (1.2); Level: Administrator; '\nname: Honeynet Project - Honeywall\nport: 0\nvendor: HONEYNET PROJECT\n"
  },
  {
    "path": "totalpass/payloads/cirt/horizon datasys/FoolProof.yml",
    "content": "auth:\n  credentials:\n  - password: foolproof\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Horizon DataSys - FoolProof\nport: 0\nvendor: HORIZON DATASYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/hosting controller/Hosting Controller.yml",
    "content": "auth:\n  credentials:\n  - password: advcomm500349\n    username: AdvWebadmin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Hosting Controller - Hosting Controller\nport: 0\nvendor: HOSTING CONTROLLER\n"
  },
  {
    "path": "totalpass/payloads/cirt/hp/MSA2000 G3.yml",
    "content": "auth:\n  credentials:\n  - password: '!admin'\n    username: admin\ncategory: unknown\ncomment: 'Level: administrator; '\nname: HP - MSA2000 G3\nport: 0\nvendor: HP\n"
  },
  {
    "path": "totalpass/payloads/cirt/huawei technologies co/MT880r.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: TMAR#HWMT8007079\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Huawei Technologies Co - MT880r\nport: 0\nvendor: HUAWEI TECHNOLOGIES CO\n"
  },
  {
    "path": "totalpass/payloads/cirt/huawei technologies co/Multiple.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Also: Admin/admin; '\nname: Huawei Technologies Co - Multiple\nport: 0\nvendor: HUAWEI TECHNOLOGIES CO\n"
  },
  {
    "path": "totalpass/payloads/cirt/hyperic inc/Hyperic HQ Portal.yml",
    "content": "auth:\n  credentials:\n  - password: hqadmin\n    username: hqadmin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://support.hyperic.com/display/DOC/QuickStart+Installation; '\nname: Hyperic, Inc. - Hyperic HQ Portal\nport: 0\nvendor: HYPERIC, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/AIX.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: guest\n  - password: guest\n    username: guest\ncategory: multi\ncomment: 'Level: User; '\nname: IBM - AIX\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/Ascend OEM Routers.yml",
    "content": "auth:\n  credentials:\n  - password: ascend\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: IBM - Ascend OEM Routers\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/Bladecenter Advanced Management Module.yml",
    "content": "auth:\n  credentials:\n  - password: PASSW0RD\n    username: USERID\ncategory: unknown\ncomment: ''\nname: IBM - Bladecenter Advanced Management Module\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/CICS.yml",
    "content": "auth:\n  credentials:\n  - password: SYSA\n    username: SYSA\n  - password: PROG\n    username: PROG\n  - password: OPER\n    username: OPER\n  - password: $SRV\n    username: $SRV\n  - password: VCSRV\n    username: VCSRV\n  - password: PRODCICS\n    username: PRODCICS\n  - password: BASE\n    username: POST\n  - password: CISSUS\n    username: CICSUSER\n  - password: DBDCCIC\n    username: DBDCCICS\n  - password: FORSE\n    username: FORSE\ncategory: unknown\ncomment: ''\nname: IBM - CICS\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/DB2.yml",
    "content": "auth:\n  credentials:\n  - password: db2fenc1\n    username: db2fenc1\n  - password: db2inst1\n    username: db2inst1\ncategory: unknown\ncomment: ''\nname: IBM - DB2\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/Domino Go.yml",
    "content": "auth:\n  credentials:\n  - password: webibm\n    username: webadmin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Lotus; '\nname: IBM - Domino Go\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/Fibre Switch.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: 3534 F08; Level: Administrator; '\nname: IBM - Fibre Switch\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/HMC.yml",
    "content": "auth:\n  credentials:\n  - password: abc123\n    username: hscroot\n  - password: passw0rd\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://pic.dhe.ibm.com/infocenter/powersys/v3r1m5/index.jsp?topic=/iphai_p5/whychgprepwds.htm; '\nname: IBM - HMC\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/Integrated Management Module (IMM).yml",
    "content": "auth:\n  credentials:\n  - password: PASSW0RD\n    username: USERID\ncategory: http\ncomment: 'Doc: http://pic.dhe.ibm.com/infocenter/ts7600/serv/index.jsp?topic=%2Fcom.ibm.storage.ts7650_3-1.service.doc%2Fts7650pdg_server_logon_imm_web.html; '\nname: IBM - Integrated Management Module (IMM)\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/OS-400.yml",
    "content": "auth:\n  credentials:\n  - password: QSRV\n    username: QSRV\n  - password: '11111111'\n    username: QSRV\n  - password: '22222222'\n    username: QSRV\n  - password: USERP\n    username: user\n  - password: secacm\n    username: sedacm\n  - password: sysopr\n    username: sysopr\n  - password: password\n    username: ibm\n  - password: '2222'\n    username: ibm\n  - password: service\n    username: ibm\n  - password: qpgmr\n    username: qpgmr\n  - password: qsecofr\n    username: qsecofr\n  - password: '11111111'\n    username: qsecofr\n  - password: '22222222'\n    username: qsecofr\n  - password: qserv\n    username: qserv\n  - password: qsvr\n    username: qsvr\n  - password: quser\n    username: quser\n  - password: qsrv\n    username: qsrv\n  - password: qsrvbas\n    username: qsrvbas\n  - password: '11111111'\n    username: '11111111'\n  - password: '22222222'\n    username: '22222222'\n  - password: ibmcel\n    username: qsvr\n  - password: qsysopr\n    username: qsysopr\n  - password: secofr\n    username: secofr\ncategory: multi\ncomment: ''\nname: IBM - OS/400\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: IBM\n    username: ''\n  - password: MBIU0\n    username: ''\n  - password: sertafu\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: IBM - PC BIOS\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/POS CMOS.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ESSEX\n  - password: ''\n    username: IPC\ncategory: console\ncomment: ''\nname: IBM - POS CMOS\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/RACF.yml",
    "content": "auth:\n  credentials:\n  - password: SYS1\n    username: IBMUSER\ncategory: unknown\ncomment: ''\nname: IBM - RACF\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/SONAS.yml",
    "content": "auth:\n  credentials:\n  - password: PASSWORD\n    username: USERID\ncategory: serial over lan\ncomment: 'Doc: http://pic.dhe.ibm.com/infocenter/sonasic/sonas1ic/index.jsp?topic=%2Fcom.ibm.sonas.doc%2Fcreate_sol.html; '\nname: IBM - SONAS\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/Sterling Managed File Transfer.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: fg_sysadmin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://webcache.googleusercontent.com/search?q=cache:tjiEP5dFc6IJ:help.sterlingcommerce.com/SFG20/topic/T94571/SFGCreateUserAccts_5101_127332_22331.html+sterling+fg_sysadmin+password&cd=1&hl=en&ct=clnk&gl=us&client=ubuntu&source=www.google.com;\n  Notes: Formerly AT&T Sterling Commerce; '\nname: IBM - Sterling Managed File Transfer\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/Tivoli.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: IBM - Tivoli\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/TotalStorage.yml",
    "content": "auth:\n  credentials:\n  - password: specialist\n    username: storwatch\ncategory: http\ncomment: 'Level: Administrator; '\nname: IBM - TotalStorage\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/VM-CMS - multi.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: VTAMUSER\ncategory: multi\ncomment: ''\nname: IBM - VM/CMS - multi\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/ibm/VM-CMS.yml",
    "content": "auth:\n  credentials:\n  - password: MAINT\n    username: MAINT\n  - password: OPERATIONS\n    username: OPERATIONS\n  - password: OPERATNS\n    username: OPERATNS\n  - password: CMSBATCH\n    username: CMSBATCH\n  - password: VTAM\n    username: VTAM\n  - password: Operator\n    username: Operator\ncategory: unknown\ncomment: ''\nname: IBM - VM/CMS\nport: 0\nvendor: IBM\n"
  },
  {
    "path": "totalpass/payloads/cirt/inedo/Proget.yml",
    "content": "auth:\n  credentials:\n  - password: Admin\n    username: Admin\ncategory: http\ncomment: 'Doc: http://inedo.com/support/tutorials/getting-started-with-proget-private-npm-registries; '\nname: Inedo - Proget\nport: 0\nvendor: INEDO\n"
  },
  {
    "path": "totalpass/payloads/cirt/informix/Database.yml",
    "content": "auth:\n  credentials:\n  - password: informix\n    username: informix\ncategory: unknown\ncomment: ''\nname: Informix - Database\nport: 0\nvendor: INFORMIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/infrant/ReadyNAS.yml",
    "content": "auth:\n  credentials:\n  - password: infrant1\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Infrant - ReadyNAS\nport: 0\nvendor: INFRANT\n"
  },
  {
    "path": "totalpass/payloads/cirt/innovaphone/IP 20.yml",
    "content": "auth:\n  credentials:\n  - password: ip20\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.annexnet.cz/New_PDF/innovaphone/gwe_manual.pdf; '\nname: Innovaphone - IP 20\nport: 0\nvendor: INNOVAPHONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/innovaphone/IP 21.yml",
    "content": "auth:\n  credentials:\n  - password: ip21\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.annexnet.cz/New_PDF/innovaphone/gwe_manual.pdf; '\nname: Innovaphone - IP 21\nport: 0\nvendor: INNOVAPHONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/innovaphone/IP 3000.yml",
    "content": "auth:\n  credentials:\n  - password: ip3000\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.annexnet.cz/New_PDF/innovaphone/gwe_manual.pdf; '\nname: Innovaphone - IP 3000\nport: 0\nvendor: INNOVAPHONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/innovaphone/IP 305.yml",
    "content": "auth:\n  credentials:\n  - password: ip305Beheer\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Innovaphone - IP 305\nport: 0\nvendor: INNOVAPHONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/innovaphone/IP 400.yml",
    "content": "auth:\n  credentials:\n  - password: ip400\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.annexnet.cz/New_PDF/innovaphone/gwe_manual.pdf; '\nname: Innovaphone - IP 400\nport: 0\nvendor: INNOVAPHONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/inova/ONT4BKP.yml",
    "content": "auth:\n  credentials:\n  - password: timely\n    username: iclock\ncategory: unknown\ncomment: ''\nname: Inova - ONT4BKP\nport: 0\nvendor: INOVA\n"
  },
  {
    "path": "totalpass/payloads/cirt/integrated networks/IP Phone.yml",
    "content": "auth:\n  credentials:\n  - password: '19750407'\n    username: Administrator\n  - password: '12345678'\n    username: Administrator\n  - password: '1234'\n    username: Administrator\ncategory: http\ncomment: 'Version: IN1002; Level: Administrator; '\nname: Integrated Networks - IP Phone\nport: 0\nvendor: INTEGRATED NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/intel/LanRover VPN Gateway.yml",
    "content": "auth:\n  credentials:\n  - password: shiva\n    username: ''\n  - password: isolation\n    username: ''\ncategory: multi\ncomment: 'Version: 6.0 >; Level: Administrator; '\nname: Intel - LanRover VPN Gateway\nport: 0\nvendor: INTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/intel/Shiva Lanrovers.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: root\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Intel - Shiva Lanrovers\nport: 0\nvendor: INTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/intel/Shiva.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: Guest\n  - password: ''\n    username: root\ncategory: multi\ncomment: 'Level: User; '\nname: Intel - Shiva\nport: 0\nvendor: INTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/intellitouch/VoIP Broadband Telephone Deskset - phone.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: administrator\ncategory: phone\ncomment: 'Version: ITC 3002; Level: Administrator; '\nname: IntelliTouch - VoIP Broadband Telephone Deskset - phone\nport: 0\nvendor: INTELLITOUCH\n"
  },
  {
    "path": "totalpass/payloads/cirt/intellitouch/VoIP Broadband Telephone Deskset.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: administrator\ncategory: http\ncomment: 'Version: ITC 3002; Level: Administrator; '\nname: IntelliTouch - VoIP Broadband Telephone Deskset\nport: 0\nvendor: INTELLITOUCH\n"
  },
  {
    "path": "totalpass/payloads/cirt/interbase/Interbase Database Server.yml",
    "content": "auth:\n  credentials:\n  - password: masterkey\n    username: SYSDBA\ncategory: multi\ncomment: 'Version: All; Level: Administrator; '\nname: Interbase - Interbase Database Server\nport: 0\nvendor: INTERBASE\n"
  },
  {
    "path": "totalpass/payloads/cirt/interfaceware inc/Iguana.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admn\ncategory: http\ncomment: 'Level: Administrator; Doc: http://help.interfaceware.com/kb/767; '\nname: iNTERFACEWARE Inc. - Iguana\nport: 0\nvendor: INTERFACEWARE INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/intermec/EasyLAN.yml",
    "content": "auth:\n  credentials:\n  - password: intermec\n    username: ''\ncategory: http\ncomment: 'Version: 10i2; Level: Administrator; '\nname: Intermec - EasyLAN\nport: 0\nvendor: INTERMEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/internet archive/Heritrix.yml",
    "content": "auth:\n  credentials:\n  - password: letmein\n    username: admin\ncategory: unknown\ncomment: 'Version: 1.6.0; Level: Administrator; '\nname: Internet Archive - Heritrix\nport: 0\nvendor: INTERNET ARCHIVE\n"
  },
  {
    "path": "totalpass/payloads/cirt/intersystems/Cache Post-RDMS.yml",
    "content": "auth:\n  credentials:\n  - password: sys\n    username: system\ncategory: console\ncomment: 'Level: Administrator; '\nname: Intersystems - Cache Post-RDMS\nport: 0\nvendor: INTERSYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/inventel wanadoo/LiveBox D34A.yml",
    "content": "auth:\n  credentials:\n  - password: Admin\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Inventel Wanadoo - LiveBox D34A\nport: 0\nvendor: INVENTEL WANADOO\n"
  },
  {
    "path": "totalpass/payloads/cirt/ipswitch/WS_FTP Server.yml",
    "content": "auth:\n  credentials:\n  - password: X#1833\n    username: XXSESS_MGRYY\ncategory: unknown\ncomment: 'Level: Administrator; Notes: User''s RealName: Local Session Manager; '\nname: Ipswitch - WS_FTP Server\nport: 0\nvendor: IPSWITCH\n"
  },
  {
    "path": "totalpass/payloads/cirt/ipswitch/WhatsUp Gold.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: ''\n    username: guest\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.ipswitch.com/support/whatsup/guide/v700/7browsera3.html; '\nname: Ipswitch - WhatsUp Gold\nport: 0\nvendor: IPSWITCH\n"
  },
  {
    "path": "totalpass/payloads/cirt/iqinvision/IQeye.yml",
    "content": "auth:\n  credentials:\n  - password: system\n    username: root\ncategory: java application\ncomment: 'Version: 510, 511 and 700 Series; Level: Administrator; Doc: http://www.iqeye.com/iqeye/images/uploads/File/manuals/Quick-Install.pdf; '\nname: IQinVision - IQeye\nport: 0\nvendor: IQINVISION\n"
  },
  {
    "path": "totalpass/payloads/cirt/irc/IRC Daemon.yml",
    "content": "auth:\n  credentials:\n  - password: FOOBAR\n    username: ''\ncategory: irc\ncomment: 'Level: Access; '\nname: IRC - IRC Daemon\nport: 0\nvendor: IRC\n"
  },
  {
    "path": "totalpass/payloads/cirt/ironport/C30.yml",
    "content": "auth:\n  credentials:\n  - password: ironport\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: IronPort - C30\nport: 0\nvendor: IRONPORT\n"
  },
  {
    "path": "totalpass/payloads/cirt/iwill/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: iwill\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Iwill - PC BIOS\nport: 0\nvendor: IWILL\n"
  },
  {
    "path": "totalpass/payloads/cirt/jamf software/Casper Suite.yml",
    "content": "auth:\n  credentials:\n  - password: jamfsw03\n    username: jamfsoftware\ncategory: mysql\ncomment: 'Level: Administrator; Doc: http://resources.jamfsoftware.com/archive/Casper_Suite_Administrators_Guide.pdf; '\nname: JAMF Software - Casper Suite\nport: 0\nvendor: JAMF SOFTWARE\n"
  },
  {
    "path": "totalpass/payloads/cirt/janitza/UMG 508 - unknown.yml",
    "content": "auth:\n  credentials:\n  - password: 0th\n    username: Homepage Password\ncategory: unknown\ncomment: 'Doc: https://wiki.janitza.de/display/GRIDVIS40/UMG+604+-+Passwort; Notes:\n  UMG 508, 509, 511, 604, and 605; '\nname: Janitza - UMG 508 - unknown\nport: 0\nvendor: JANITZA\n"
  },
  {
    "path": "totalpass/payloads/cirt/janitza/UMG 508.yml",
    "content": "auth:\n  credentials:\n  - password: Janitza\n    username: admin\n  - password: Janitza\n    username: user\n  - password: Janitza\n    username: guest\ncategory: ftp\ncomment: 'Level: Administrator; Doc: https://wiki.janitza.de/display/GRIDVIS40/UMG+604+-+Passwort;\n  Notes: UMG 508, 509, 511, 604, and 605; '\nname: Janitza - UMG 508\nport: 0\nvendor: JANITZA\n"
  },
  {
    "path": "totalpass/payloads/cirt/jaspersoft corporation/Jasper Reports Server.yml",
    "content": "auth:\n  credentials:\n  - password: superuser\n    username: superuser\n  - password: jasperadmin\n    username: jasperadmin\n  - password: joeuser\n    username: joeuser\n  - password: demo\n    username: demo\ncategory: http\ncomment: 'Level: Administrator; Doc: http://community.jaspersoft.com/documentation/jasperreports-server-install-guide-community-edition; '\nname: Jaspersoft Corporation - Jasper Reports Server\nport: 0\nvendor: JASPERSOFT CORPORATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/jd edwards/WorldVision-OneWorld - tcp 1964.yml",
    "content": "auth:\n  credentials:\n  - password: JDE\n    username: JDE\ncategory: tcp 1964\ncomment: 'Version: All(?); Level: Admin/SECOFR; '\nname: JD Edwards - WorldVision/OneWorld - tcp 1964\nport: 0\nvendor: JD EDWARDS\n"
  },
  {
    "path": "totalpass/payloads/cirt/jd edwards/WorldVision-OneWorld.yml",
    "content": "auth:\n  credentials:\n  - password: JDE\n    username: JDE\ncategory: console\ncomment: 'Version: All(?); Level: Admin/SECOFR; '\nname: JD Edwards - WorldVision/OneWorld\nport: 0\nvendor: JD EDWARDS\n"
  },
  {
    "path": "totalpass/payloads/cirt/jean-philippe lang/Redmine.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.redmine.org/projects/redmine/wiki/RedmineInstall; '\nname: Jean-Philippe Lang - Redmine\nport: 0\nvendor: JEAN-PHILIPPE LANG\n"
  },
  {
    "path": "totalpass/payloads/cirt/jeebles technology/Jeebles Directory.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: http\ncomment: 'Version: 2.9.60; Level: Administrator; '\nname: Jeebles Technology - Jeebles Directory\nport: 0\nvendor: JEEBLES TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/jetform/Jetform Design.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: Jetform\ncategory: http\ncomment: 'Level: Administrator; '\nname: Jetform - Jetform Design\nport: 0\nvendor: JETFORM\n"
  },
  {
    "path": "totalpass/payloads/cirt/jetway/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: spooml\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: JetWay - PC BIOS\nport: 0\nvendor: JETWAY\n"
  },
  {
    "path": "totalpass/payloads/cirt/johnson controls/HVAC System.yml",
    "content": "auth:\n  credentials:\n  - password: control\n    username: johnson\ncategory: modem\ncomment: ''\nname: Johnson Controls - HVAC System\nport: 0\nvendor: JOHNSON CONTROLS\n"
  },
  {
    "path": "totalpass/payloads/cirt/joss technology/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: 57gbzb\n    username: ''\n  - password: technolgi\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Joss Technology - PC BIOS\nport: 0\nvendor: JOSS TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/juniper/DX.yml",
    "content": "auth:\n  credentials:\n  - password: netscreen\n    username: admin\n  - password: redline\n    username: redline\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Juniper - DX\nport: 0\nvendor: JUNIPER\n"
  },
  {
    "path": "totalpass/payloads/cirt/juniper/Junos Space - http.yml",
    "content": "auth:\n  credentials:\n  - password: juniper123\n    username: super\ncategory: http\ncomment: 'Level: Administrator; Doc: https://kb.juniper.net/InfoCenter/index?page=content&id=KB26220&actp=search; '\nname: Juniper - Junos Space - http\nport: 0\nvendor: JUNIPER\n"
  },
  {
    "path": "totalpass/payloads/cirt/juniper/Junos Space.yml",
    "content": "auth:\n  credentials:\n  - password: abc123\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; Doc: https://kb.juniper.net/InfoCenter/index?page=content&id=KB26220&actp=search; '\nname: Juniper - Junos Space\nport: 0\nvendor: JUNIPER\n"
  },
  {
    "path": "totalpass/payloads/cirt/juniper/Netscreen.yml",
    "content": "auth:\n  credentials:\n  - password: netscreen\n    username: netscreen\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Juniper - Netscreen\nport: 0\nvendor: JUNIPER\n"
  },
  {
    "path": "totalpass/payloads/cirt/juniper/Peribit WX.yml",
    "content": "auth:\n  credentials:\n  - password: netscreen\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Juniper - Peribit WX\nport: 0\nvendor: JUNIPER\n"
  },
  {
    "path": "totalpass/payloads/cirt/juniper/Peribit.yml",
    "content": "auth:\n  credentials:\n  - password: peribit\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Juniper - Peribit\nport: 0\nvendor: JUNIPER\n"
  },
  {
    "path": "totalpass/payloads/cirt/justin hagstrom/AutoIndex.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: test\n    username: test\ncategory: unknown\ncomment: 'Version: 1.3.2; Level: Administrator; Doc: http://autoindex.sourceforge.net/; '\nname: Justin Hagstrom - AutoIndex\nport: 0\nvendor: JUSTIN HAGSTROM\n"
  },
  {
    "path": "totalpass/payloads/cirt/kentico software/Kentico CMS for ASP.NET.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: administrator\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.kentico.com/downloads/kenticocms_quickguide.pdf; '\nname: Kentico Software - Kentico CMS for ASP.NET\nport: 0\nvendor: KENTICO SOFTWARE\n"
  },
  {
    "path": "totalpass/payloads/cirt/kethinov/Kboard Forum.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: root\ncategory: sql\ncomment: 'Version: 0.3.x; Level: Administrator; Doc: http://freshmeat.net/projects/kboardforum/; '\nname: Kethinov - Kboard Forum\nport: 0\nvendor: KETHINOV\n"
  },
  {
    "path": "totalpass/payloads/cirt/kodak/MIM - http.yml",
    "content": "auth:\n  credentials:\n  - password: PASSWORD\n    username: SA\ncategory: http\ncomment: 'Level: Administrator; Doc: http://yeec.com/uploadimages1/forum/yingxiang/kodak/mim_service_manual_v6_1.pdf; '\nname: Kodak - MIM - http\nport: 0\nvendor: KODAK\n"
  },
  {
    "path": "totalpass/payloads/cirt/kodak/MIM - serial.yml",
    "content": "auth:\n  credentials:\n  - password: Service\n    username: Service\ncategory: serial\ncomment: 'Doc: http://yeec.com/uploadimages1/forum/yingxiang/kodak/mim_service_manual_v6_1.pdf; '\nname: Kodak - MIM - serial\nport: 0\nvendor: KODAK\n"
  },
  {
    "path": "totalpass/payloads/cirt/kodak/MIM - windows.yml",
    "content": "auth:\n  credentials:\n  - password: NetServer\n    username: RNIServiceManager\ncategory: windows\ncomment: 'Doc: http://yeec.com/uploadimages1/forum/yingxiang/kodak/mim_service_manual_v6_1.pdf; '\nname: Kodak - MIM - windows\nport: 0\nvendor: KODAK\n"
  },
  {
    "path": "totalpass/payloads/cirt/kodak/MIM.yml",
    "content": "auth:\n  credentials:\n  - password: NetServer\n    username: PLMIMService\ncategory: pc anywhere\ncomment: 'Doc: http://yeec.com/uploadimages1/forum/yingxiang/kodak/mim_service_manual_v6_1.pdf; '\nname: Kodak - MIM\nport: 0\nvendor: KODAK\n"
  },
  {
    "path": "totalpass/payloads/cirt/kodak/PACS.yml",
    "content": "auth:\n  credentials:\n  - password: NetServer\n    username: PACSLinkIP\ncategory: pc anywhere\ncomment: 'Doc: http://yeec.com/uploadimages1/forum/yingxiang/kodak/mim_service_manual_v6_1.pdf; '\nname: Kodak - PACS\nport: 0\nvendor: KODAK\n"
  },
  {
    "path": "totalpass/payloads/cirt/konica minolta/Bizhub C10, magicolor 2490MF.yml",
    "content": "auth:\n  credentials:\n  - password: MagiMFP\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.kn.nl/data/handleiding/182185/Reference%20Guide%20Magicolor%202490MF.pdf; '\nname: Konica Minolta - Bizhub C10, magicolor 2490MF\nport: 0\nvendor: KONICA MINOLTA\n"
  },
  {
    "path": "totalpass/payloads/cirt/konica minolta/PageScope Web Connection.yml",
    "content": "auth:\n  credentials:\n  - password: '0000'\n    username: ''\ncategory: physical access\ncomment: 'Level: Administrator; '\nname: Konica Minolta - PageScope Web Connection\nport: 0\nvendor: KONICA MINOLTA\n"
  },
  {
    "path": "totalpass/payloads/cirt/kronos/Workforce Central.yml",
    "content": "auth:\n  credentials:\n  - password: kronites\n    username: SuperUser\ncategory: http\ncomment: 'Version: v6; Level: Administrator; Doc: http://www.scribd.com/doc/56930986/System-Administrators-Guide#outer_page_29; '\nname: Kronos - Workforce Central\nport: 0\nvendor: KRONOS\n"
  },
  {
    "path": "totalpass/payloads/cirt/kyocera/FS-1020D.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Kyocera - FS-1020D\nport: 0\nvendor: KYOCERA\n"
  },
  {
    "path": "totalpass/payloads/cirt/lacie/500GB ETHERNET DISK MINI.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: LaCie - 500GB ETHERNET DISK MINI\nport: 0\nvendor: LACIE\n"
  },
  {
    "path": "totalpass/payloads/cirt/lansa/LANSA.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: WEBADM\ncategory: unknown\ncomment: 'Version: 9.1; Level: Administrator; '\nname: LANSA - LANSA\nport: 0\nvendor: LANSA\n"
  },
  {
    "path": "totalpass/payloads/cirt/lansa/aXes.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: dev\n    username: dev\ncategory: http\ncomment: 'Level: Administrator; Doc: http://support.lansa.com/download/temp18/aXes_Rapid_Install_Instructions.pdf; '\nname: LANSA - aXes\nport: 0\nvendor: LANSA\n"
  },
  {
    "path": "totalpass/payloads/cirt/lantronics/Lantronics Terminal Server.yml",
    "content": "auth:\n  credentials:\n  - password: access\n    username: ''\n  - password: system\n    username: ''\ncategory: tcp 7000\ncomment: 'Level: Administrator; '\nname: Lantronics - Lantronics Terminal Server\nport: 0\nvendor: LANTRONICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/lantronix/SecureLinux Console Manager (SLC) - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: PASS\n    username: sysadmin\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Lantronix - SecureLinux Console Manager (SLC) - ssh\nport: 0\nvendor: LANTRONIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/lantronix/SecureLinux Console Manager (SLC).yml",
    "content": "auth:\n  credentials:\n  - password: PASS\n    username: sysadmin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Lantronix - SecureLinux Console Manager (SLC)\nport: 0\nvendor: LANTRONIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/lantronix/ThinWeb Manager (MSS-VIA).yml",
    "content": "auth:\n  credentials:\n  - password: access\n    username: ''\ncategory: unknown\ncomment: 'Version: 1.0; Level: Administrator; '\nname: Lantronix - ThinWeb Manager (MSS-VIA)\nport: 0\nvendor: LANTRONIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/leading edge/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: MASTER\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Leading Edge - PC BIOS\nport: 0\nvendor: LEADING EDGE\n"
  },
  {
    "path": "totalpass/payloads/cirt/lenel/OnGuard.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: TCP 9999; '\nname: Lenel - OnGuard\nport: 0\nvendor: LENEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/level1/WAP_002.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Level1 - WAP_002\nport: 0\nvendor: LEVEL1\n"
  },
  {
    "path": "totalpass/payloads/cirt/lgic/Goldstream.yml",
    "content": "auth:\n  credentials:\n  - password: LR-ISDN\n    username: LR-ISDN\ncategory: unknown\ncomment: ''\nname: LGIC - Goldstream\nport: 0\nvendor: LGIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/liebert/Rack PDU Card (RPC).yml",
    "content": "auth:\n  credentials:\n  - password: Liebert\n    username: Liebert\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.emersonnetworkpower.com/documentation/en-us/products/acpower/rackpdu/documents/sl-20826.pdf; '\nname: Liebert - Rack PDU Card (RPC)\nport: 0\nvendor: LIEBERT\n"
  },
  {
    "path": "totalpass/payloads/cirt/lindsay electronics/Sentinel-AMT.yml",
    "content": "auth:\n  credentials:\n  - password: SENTINEL\n    username: ADMINISTRATOR\n  - password: SENTINEL\n    username: SENTINEL\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Lindsay Electronics - Sentinel-AMT\nport: 0\nvendor: LINDSAY ELECTRONICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/ADSL Router.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: ''\ncategory: unknown\ncomment: 'Version: 2700v; Level: Administrator; '\nname: Linksys - ADSL Router\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/BEFW11S4.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Linksys - BEFW11S4\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/DSL.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Linksys - DSL\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/EA2700.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Linksys - EA2700\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/PSUS4.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Print Server for USB with 4-Port Switch; '\nname: Linksys - PSUS4\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/SRW224.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default management URL: http://192.168.1.254; '\nname: Linksys - SRW224\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/WAG54G.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Linksys - WAG54G\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/WAP Router.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: (blank)\ncategory: http\ncomment: 'Version: 4 Port, 2.4GHz; Level: Administrator; '\nname: Linksys - WAP Router\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/WAP11.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Linksys - WAP11\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/WAP54G.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: (blank)\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP is 192.168.1.245; '\nname: Linksys - WAP54G\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/WCG200.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Linksys - WCG200\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/WET11.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Linksys - WET11\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/WET54G.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Linksys - WET54G\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/WRT54GL.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Linksys - WRT54GL\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linksys/Wireless Router.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Version: WRT54G; Level: Administrator; '\nname: Linksys - Wireless Router\nport: 0\nvendor: LINKSYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/linux/Slackware.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: gonzo\n  - password: ''\n    username: satan\n  - password: ''\n    username: snake\ncategory: multi\ncomment: 'Level: User; '\nname: Linux - Slackware\nport: 0\nvendor: LINUX\n"
  },
  {
    "path": "totalpass/payloads/cirt/linux/UCLinux for UCSIMM.yml",
    "content": "auth:\n  credentials:\n  - password: uClinux\n    username: root\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Linux - UCLinux for UCSIMM\nport: 0\nvendor: LINUX\n"
  },
  {
    "path": "totalpass/payloads/cirt/liquidware labs inc/Stratusphere UX.yml",
    "content": "auth:\n  credentials:\n  - password: sspassword\n    username: ssadmin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.liquidwarelabs.com/content/pdf/documents/support/Liquidware-Labs-Stratusphere-UX-Quick-Start-Guide.pdf; '\nname: Liquidware Labs, Inc. - Stratusphere UX\nport: 0\nvendor: LIQUIDWARE LABS, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/livingston/IRX Router.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: '!root'\ncategory: telnet\ncomment: ''\nname: Livingston - IRX Router\nport: 0\nvendor: LIVINGSTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/livingston/Livingston Portmaster 3.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: '!root'\ncategory: telnet\ncomment: ''\nname: Livingston - Livingston Portmaster 3\nport: 0\nvendor: LIVINGSTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/livingston/Officerouter.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: '!root'\ncategory: telnet\ncomment: ''\nname: Livingston - Officerouter\nport: 0\nvendor: LIVINGSTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/loglogic/Loglogic Appliance.yml",
    "content": "auth:\n  credentials:\n  - password: logapp\n    username: toor\n  - password: logapp\n    username: root\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Loglogic - Loglogic Appliance\nport: 0\nvendor: LOGLOGIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/longshine/isscfg.yml",
    "content": "auth:\n  credentials:\n  - password: '0'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.tenable.com/4917.html; '\nname: Longshine - isscfg\nport: 0\nvendor: LONGSHINE\n"
  },
  {
    "path": "totalpass/payloads/cirt/lucent/B-STDX9000.yml",
    "content": "auth:\n  credentials:\n  - password: cascade\n    username: (any 3 chars)\ncategory: unknown\ncomment: ''\nname: Lucent - B-STDX9000\nport: 0\nvendor: LUCENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/lucent/System 75.yml",
    "content": "auth:\n  credentials:\n  - password: pwpw\n    username: pw\n  - password: sysadmpw\n    username: sysadm\n  - password: admpw\n    username: sysadm\n  - password: syspw\n    username: sysadm\n  - password: bciimpw\n    username: bciim\n  - password: bcimpw\n    username: bcim\n  - password: bcmspw\n    username: bcms\n  - password: bcnaspw\n    username: bcnas\n  - password: bluepw\n    username: blue\n  - password: browsepw\n    username: browse\n  - password: looker\n    username: browse\n  - password: craft\n    username: craft\n  - password: craftpw\n    username: craft\n  - password: custpw\n    username: cust\n  - password: enquirypw\n    username: enquiry\n  - password: support\n    username: field\n  - password: indspw\n    username: inads\n  - password: inads\n    username: inads\n  - password: initpw\n    username: init\n  - password: locatepw\n    username: locate\n  - password: maintpw\n    username: maint\n  - password: rwmaint\n    username: maint\n  - password: nmspw\n    username: nms\n  - password: rcustpw\n    username: rcust\n  - password: supportpw\n    username: support\n  - password: field\n    username: tech\ncategory: multi\ncomment: ''\nname: Lucent - System 75\nport: 0\nvendor: LUCENT\n"
  },
  {
    "path": "totalpass/payloads/cirt/luxon communications/IP Phone.yml",
    "content": "auth:\n  credentials:\n  - password: '19750407'\n    username: administrator\ncategory: http\ncomment: 'Level: Administrator; '\nname: Luxon Communications - IP Phone\nport: 0\nvendor: LUXON COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/m technology/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: mMmM\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: M Technology - PC BIOS\nport: 0\nvendor: M TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/machspeed/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: sp99dd\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: MachSpeed - PC BIOS\nport: 0\nvendor: MACHSPEED\n"
  },
  {
    "path": "totalpass/payloads/cirt/macsense/AeroPad Mini.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: WUA-800; Notes: Default IP: 192.168.1.50; '\nname: Macsense - AeroPad Mini\nport: 0\nvendor: MACSENSE\n"
  },
  {
    "path": "totalpass/payloads/cirt/magento/Go.yml",
    "content": "auth:\n  credentials:\n  - password: '123123'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.magentocommerce.com/wiki/recover/resetting-admin-password; '\nname: Magento - Go\nport: 0\nvendor: MAGENTO\n"
  },
  {
    "path": "totalpass/payloads/cirt/magic-pro/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: prost\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Magic-Pro - PC BIOS\nport: 0\nvendor: MAGIC-PRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/mambo/Site Server.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 4.x; Level: Administrator; Doc: http://sourceforge.org/projects/mambo; '\nname: Mambo - Site Server\nport: 0\nvendor: MAMBO\n"
  },
  {
    "path": "totalpass/payloads/cirt/manageengine/ADSelfService Plus.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.manageengine.com/products/self-service-password/help/admin-guide/index.html; '\nname: ManageEngine - ADSelfService Plus\nport: 0\nvendor: MANAGEENGINE\n"
  },
  {
    "path": "totalpass/payloads/cirt/manageengine/Desktop Central.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://www.manageengine.com/products/desktop-central/readme.html;\n  Notes: Port 8020; '\nname: ManageEngine - Desktop Central\nport: 0\nvendor: MANAGEENGINE\n"
  },
  {
    "path": "totalpass/payloads/cirt/mandarin library automation/Mandarin M3.yml",
    "content": "auth:\n  credentials:\n  - password: boca raton\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.nassauboces.org/cms/lib5/NY18000988/Centricity/Domain/31/Automation_handouts/M3_Users_Guide_1.6_SP1.pdf; '\nname: Mandarin Library Automation - Mandarin M3\nport: 0\nvendor: MANDARIN LIBRARY AUTOMATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/mantis/Mantis.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: administrator\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Mantis - Mantis\nport: 0\nvendor: MANTIS\n"
  },
  {
    "path": "totalpass/payloads/cirt/megastar/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: star\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Megastar - PC BIOS\nport: 0\nvendor: MEGASTAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/mentec/Micro-RSX.yml",
    "content": "auth:\n  credentials:\n  - password: RSX\n    username: MICRO\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Mentec - Micro/RSX\nport: 0\nvendor: MENTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/mercury interactive/Topaz Prism.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Mercury Interactive - Topaz Prism\nport: 0\nvendor: MERCURY INTERACTIVE\n"
  },
  {
    "path": "totalpass/payloads/cirt/michiel/PHPlist.yml",
    "content": "auth:\n  credentials:\n  - password: phplist\n    username: admin\ncategory: http\ncomment: 'Version: 2.6.4; Level: Administrator; Doc: http://freshmeat.net/projects/phplist/; '\nname: Michiel - PHPlist\nport: 0\nvendor: MICHIEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/microcom/ADSL Routers.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\n  - password: password\n    username: user\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Microcom - ADSL Routers\nport: 0\nvendor: MICROCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/microcom/Unknown.yml",
    "content": "auth:\n  credentials:\n  - password: superuser\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Microcom - Unknown\nport: 0\nvendor: MICROCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/micron/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: sldkj754\n    username: ''\n  - password: xyzall\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Micron - PC BIOS\nport: 0\nvendor: MICRON\n"
  },
  {
    "path": "totalpass/payloads/cirt/micronet/Wireless Broadband Router.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: SP916BM; Level: Administrator; Doc: http://archives.neohapsis.com/archives/bugtraq/2004-10/0078.html; '\nname: Micronet - Wireless Broadband Router\nport: 0\nvendor: MICRONET\n"
  },
  {
    "path": "totalpass/payloads/cirt/micronics/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: dn_04rjc\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Micronics - PC BIOS\nport: 0\nvendor: MICRONICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/microplex/Print Server.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: root\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Microplex - Print Server\nport: 0\nvendor: MICROPLEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/microsoft/Base Station MN500.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Microsoft - Base Station MN500\nport: 0\nvendor: MICROSOFT\n"
  },
  {
    "path": "totalpass/payloads/cirt/microsoft/SQL Server 2000.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: sa\n  - password: ''\n    username: sa\ncategory: unknown\ncomment: 'Version: SP3; '\nname: Microsoft - SQL Server 2000\nport: 0\nvendor: MICROSOFT\n"
  },
  {
    "path": "totalpass/payloads/cirt/microsoft/SiteServer.yml",
    "content": "auth:\n  credentials:\n  - password: LdapPassword_1\n    username: LDAP_Anonymous\ncategory: http\ncomment: 'Version: 3.x; '\nname: Microsoft - SiteServer\nport: 0\nvendor: MICROSOFT\n"
  },
  {
    "path": "totalpass/payloads/cirt/microsoft/Windows NT.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: (NULL)\n  - password: Administrator\n    username: Administrator\n  - password: ''\n    username: Administrator\n  - password: Guest\n    username: Guest\n  - password: ''\n    username: Guest\n  - password: IS_$hostname\n    username: IS_$hostname\n  - password: User\n    username: User\ncategory: multi\ncomment: 'Level: User; '\nname: Microsoft - Windows NT\nport: 0\nvendor: MICROSOFT\n"
  },
  {
    "path": "totalpass/payloads/cirt/microsoft/Wireless Access Point-Router.yml",
    "content": "auth:\n  credentials:\n  - password: MSHOME\n    username: MSHOME\ncategory: unknown\ncomment: 'Version: MN700; '\nname: Microsoft - Wireless Access Point/Router\nport: 0\nvendor: MICROSOFT\n"
  },
  {
    "path": "totalpass/payloads/cirt/mike peters/BasiliX.yml",
    "content": "auth:\n  credentials:\n  - password: bsxpass\n    username: bsxuser\ncategory: sql\ncomment: 'Version: 1.1.1; Level: Administrator; Doc: http://freshmeat.net/projects/basilix/; '\nname: Mike Peters - BasiliX\nport: 0\nvendor: MIKE PETERS\n"
  },
  {
    "path": "totalpass/payloads/cirt/mikrotik/Routers.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: May also work for telnet; '\nname: MikroTik - Routers\nport: 0\nvendor: MIKROTIK\n"
  },
  {
    "path": "totalpass/payloads/cirt/mintel/Mintel PBX.yml",
    "content": "auth:\n  credentials:\n  - password: SYSTEM\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Mintel - Mintel PBX\nport: 0\nvendor: MINTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/mitel networks/SX2000 - serial.yml",
    "content": "auth:\n  credentials:\n  - password: 5X2000\n    username: s1stem\ncategory: serial\ncomment: 'Level: Administrator; Doc: http://www.tek-tips.com/viewthread.cfm?qid=1036643; '\nname: Mitel Networks - SX2000 - serial\nport: 0\nvendor: MITEL NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/mitel networks/SX2000.yml",
    "content": "auth:\n  credentials:\n  - password: sx2000\n    username: system\n  - password: sx2000\n    username: installer\n  - password: sx2000\n    username: maint1\n  - password: sx2000\n    username: maint2\n  - password: 5X2000\n    username: 1nstaller\n  - password: 5X2000\n    username: s1stem\ncategory: telnet\ncomment: 'Level: Administrator; Doc: http://www.tek-tips.com/viewthread.cfm?qid=1036643; '\nname: Mitel Networks - SX2000\nport: 0\nvendor: MITEL NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/mklencke/Forumtalk.yml",
    "content": "auth:\n  credentials:\n  - password: blablabla\n    username: root\ncategory: unknown\ncomment: 'Version: 1.0rc2; Level: Administrator; '\nname: mklencke - Forumtalk\nport: 0\nvendor: MKLENCKE\n"
  },
  {
    "path": "totalpass/payloads/cirt/mole/Mole2.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 2.1.0; Level: Administrator; '\nname: Mole - Mole2\nport: 0\nvendor: MOLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/motive/Chorus.yml",
    "content": "auth:\n  credentials:\n  - password: isee\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Motive - Chorus\nport: 0\nvendor: MOTIVE\n"
  },
  {
    "path": "totalpass/payloads/cirt/motorola/Bluetooth Headsets.yml",
    "content": "auth:\n  credentials:\n  - password: '0000'\n    username: ''\ncategory: pairing\ncomment: 'Doc: http://rarara77.googlepages.com/; '\nname: Motorola - Bluetooth Headsets\nport: 0\nvendor: MOTOROLA\n"
  },
  {
    "path": "totalpass/payloads/cirt/motorola/Cablerouter.yml",
    "content": "auth:\n  credentials:\n  - password: router\n    username: cablecom\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Motorola - Cablerouter\nport: 0\nvendor: MOTOROLA\n"
  },
  {
    "path": "totalpass/payloads/cirt/motorola/SURFboard.yml",
    "content": "auth:\n  credentials:\n  - password: yZgO8Bvj\n    username: technician\ncategory: http\ncomment: 'Version: SBG 6580; Level: Administrator; Doc: https://community.rapid7.com/Rapid7_BlogPostDetail?id=a111400000AanBsAAJ;\n  Notes: Arris; '\nname: Motorola - SURFboard\nport: 0\nvendor: MOTOROLA\n"
  },
  {
    "path": "totalpass/payloads/cirt/motorola/Various.yml",
    "content": "auth:\n  credentials:\n  - password: smile\n    username: service\n  - password: ''\n    username: setup\ncategory: unknown\ncomment: ''\nname: Motorola - Various\nport: 0\nvendor: MOTOROLA\n"
  },
  {
    "path": "totalpass/payloads/cirt/motorola/WR850G.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Motorola - WR850G\nport: 0\nvendor: MOTOROLA\n"
  },
  {
    "path": "totalpass/payloads/cirt/mp3mystic/MP3Mystic.yml",
    "content": "auth:\n  credentials:\n  - password: mp3mystic\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: MP3Mystic - MP3Mystic\nport: 0\nvendor: MP3MYSTIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/muze/Ariadne.yml",
    "content": "auth:\n  credentials:\n  - password: muze\n    username: admin\ncategory: http\ncomment: 'Version: 2.2.1; Level: Administrator; '\nname: Muze - Ariadne\nport: 0\nvendor: MUZE\n"
  },
  {
    "path": "totalpass/payloads/cirt/myiosoft/EasyNews.yml",
    "content": "auth:\n  credentials:\n  - password: demo\n    username: demo\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: MyioSoft - EasyNews\nport: 0\nvendor: MYIOSOFT\n"
  },
  {
    "path": "totalpass/payloads/cirt/mysql/Eventum.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin@example.com\ncategory: http\ncomment: 'Level: Administrator; '\nname: MySQL - Eventum\nport: 0\nvendor: MYSQL\n"
  },
  {
    "path": "totalpass/payloads/cirt/mysql/MaxDB.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: superdba\ncategory: unknown\ncomment: ''\nname: MySQL - MaxDB\nport: 0\nvendor: MYSQL\n"
  },
  {
    "path": "totalpass/payloads/cirt/mysql/MySQL.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: root\ncategory: all versions\ncomment: 'Level: Administrator; '\nname: MySQL - MySQL\nport: 0\nvendor: MYSQL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nanoteq/NetSeq.yml",
    "content": "auth:\n  credentials:\n  - password: NetSeq\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Nanoteq - NetSeq\nport: 0\nvendor: NANOTEQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/ncr/NCR UNIX.yml",
    "content": "auth:\n  credentials:\n  - password: ncrm\n    username: ncrm\ncategory: multi\ncomment: 'Level: Administrator; '\nname: NCR - NCR UNIX\nport: 0\nvendor: NCR\n"
  },
  {
    "path": "totalpass/payloads/cirt/nec/Elite IPK.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: NEC - Elite IPK\nport: 0\nvendor: NEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/netapp/NetCache.yml",
    "content": "auth:\n  credentials:\n  - password: NetCache\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Now owned by Blue Coat Systems.; '\nname: NetApp - NetCache\nport: 0\nvendor: NETAPP\n"
  },
  {
    "path": "totalpass/payloads/cirt/netapp/SANscreen.yml",
    "content": "auth:\n  credentials:\n  - password: admin123\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: Now owned by Blue Coat Systems.; '\nname: NetApp - SANscreen\nport: 0\nvendor: NETAPP\n"
  },
  {
    "path": "totalpass/payloads/cirt/netasq/Mfilter M100, M300, M1000 and M3000 - http.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: SSH to the management IP (default 10.0.0.254),\n  or web interface http://10.0.0.254:81; '\nname: Netasq - Mfilter M100, M300, M1000 and M3000 - http\nport: 0\nvendor: NETASQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/netasq/Mfilter M100, M300, M1000 and M3000.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; Notes: SSH to the management IP (default 10.0.0.254),\n  or web interface http://10.0.0.254:81; '\nname: Netasq - Mfilter M100, M300, M1000 and M3000\nport: 0\nvendor: NETASQ\n"
  },
  {
    "path": "totalpass/payloads/cirt/netbotz/Appliances.yml",
    "content": "auth:\n  credentials:\n  - password: netbotz\n    username: netbotz\ncategory: unknown\ncomment: ''\nname: NetBotz - Appliances\nport: 0\nvendor: NETBOTZ\n"
  },
  {
    "path": "totalpass/payloads/cirt/netcomm/NB1300.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\n  - password: password\n    username: user\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netcomm - NB1300\nport: 0\nvendor: NETCOMM\n"
  },
  {
    "path": "totalpass/payloads/cirt/netcomm/NB5580-NB5580W.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: (blank)\ncategory: unknown\ncomment: 'Level: Administrator; Notes: - All users are admin - Any user name (or none)\n  can be used; '\nname: Netcomm - NB5580/NB5580W\nport: 0\nvendor: NETCOMM\n"
  },
  {
    "path": "totalpass/payloads/cirt/netcordia/NetMRI.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Netcordia - NetMRI\nport: 0\nvendor: NETCORDIA\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/802.11b Wireless Cable-DSL router.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: MR814; Level: Administrator; '\nname: Netgear - 802.11b Wireless Cable/DSL router\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/Cable-DSL Router - web.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: web\ncomment: 'Version: RT-314; Level: Administrator; '\nname: Netgear - Cable/DSL Router - web\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/Cable-DSL Router.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: telnet\ncomment: 'Version: RT-314; Level: Administrator; '\nname: Netgear - Cable/DSL Router\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/DG824G.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - DG824G\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/DG824M.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - DG824M\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/DG834G - unknown.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - DG834G - unknown\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/DG834G.yml",
    "content": "auth:\n  credentials:\n  - password: zebra\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Netgear - DG834G\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/DG834PN RangeMax ADSL Wireless Router.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://aanet.net.au/mm/NetGear/dg834pn_ref_manual_11Nov05.pdf; '\nname: Netgear - DG834PN RangeMax ADSL Wireless Router\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/DM602.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - DM602\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/FSV338.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - FSV338\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/N600.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: ftp://downloads.netgear.com/files/WNDR3300v2_SM_25MAR2010.pdf; '\nname: Netgear - N600\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/ReadyNAS.yml",
    "content": "auth:\n  credentials:\n  - password: netgear1\n    username: admin\ncategory: http\ncomment: 'Version: Duo/NV+; Level: Administrator; Doc: http://www.readynas.com/download/documentation/HM/Duov1_NV%2Bv1_HW_en_06Dec11.pdf; '\nname: Netgear - ReadyNAS\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/Router.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: DG814; Level: Administrator; '\nname: Netgear - Router\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/WAP54G.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - WAP54G\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/WG602.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: 2; Level: Administrator; '\nname: Netgear - WG602\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/WGE101.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - WGE101\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/WGR614.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\n  - password: setup\n    username: admin\ncategory: unknown\ncomment: 'Version: v5; Level: Administrator; '\nname: Netgear - WGR614\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/WGT624.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - WGT624\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgear/WRG614.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netgear - WRG614\nport: 0\nvendor: NETGEAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netgenesis/NetAnalysis Web Reporting.yml",
    "content": "auth:\n  credentials:\n  - password: naadmin\n    username: naadmin\ncategory: http\ncomment: 'Level: Administrator; '\nname: NetGenesis - NetAnalysis Web Reporting\nport: 0\nvendor: NETGENESIS\n"
  },
  {
    "path": "totalpass/payloads/cirt/netopia/Netopia 7100.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Netopia - Netopia 7100\nport: 0\nvendor: NETOPIA\n"
  },
  {
    "path": "totalpass/payloads/cirt/netopia/Netopia 9500.yml",
    "content": "auth:\n  credentials:\n  - password: netopia\n    username: netopia\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Netopia - Netopia 9500\nport: 0\nvendor: NETOPIA\n"
  },
  {
    "path": "totalpass/payloads/cirt/netopia/routers.yml",
    "content": "auth:\n  credentials:\n  - password: (see note)\n    username: factory\ncategory: telnet\ncomment: 'Level: Administrator; Doc: http://packetstormsecurity.org/files/91948/Netopia-Routers-Factory-Password-Generator.html;\n  Notes: Factory password can be generated with linked password.; '\nname: Netopia - routers\nport: 0\nvendor: NETOPIA\n"
  },
  {
    "path": "totalpass/payloads/cirt/netscape/Netscape Enterprise Server.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Netscape - Netscape Enterprise Server\nport: 0\nvendor: NETSCAPE\n"
  },
  {
    "path": "totalpass/payloads/cirt/netscreen/IDP.yml",
    "content": "auth:\n  credentials:\n  - password: netscreen\n    username: admin\ncategory: unknown\ncomment: 'Version: 2.0p1; Level: Administrator; '\nname: Netscreen - IDP\nport: 0\nvendor: NETSCREEN\n"
  },
  {
    "path": "totalpass/payloads/cirt/netscreen/Netscreen.yml",
    "content": "auth:\n  credentials:\n  - password: netscreen\n    username: netscreen\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Netscreen - Netscreen\nport: 0\nvendor: NETSCREEN\n"
  },
  {
    "path": "totalpass/payloads/cirt/netstar/Netpilot.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Netstar - Netpilot\nport: 0\nvendor: NETSTAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/netwin/WebNews.yml",
    "content": "auth:\n  credentials:\n  - password: newstest\n    username: testweb\n  - password: imaptest\n    username: alwn3845\n  - password: wtest3452\n    username: alwi3845\n  - password: wtest4879\n    username: testweb2\ncategory: http\ncomment: 'Level: Administrator; Doc: https://www.securityfocus.com/bid/4156/discuss; '\nname: NetWin - WebNews\nport: 0\nvendor: NETWIN\n"
  },
  {
    "path": "totalpass/payloads/cirt/networkice/ICECap Manager.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: iceman\ncategory: '8081'\ncomment: 'Version: 2.0.22 <; Level: Administrator; '\nname: NetworkICE - ICECap Manager\nport: 0\nvendor: NETWORKICE\n"
  },
  {
    "path": "totalpass/payloads/cirt/newmedia-net gmbh/DD-WRT.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: root\ncategory: http\ncomment: 'Version: v23 SP1; Level: Administrator; Doc: http://www.dd-wrt.com/wiki/index.php/Index:FAQ#What.27s_the_default_username_and_password.3F;\n  Notes: HTTP, telnet and SSH.; '\nname: NewMedia-NET GmbH - DD-WRT\nport: 0\nvendor: NEWMEDIA-NET GMBH\n"
  },
  {
    "path": "totalpass/payloads/cirt/nexsan/ATABoy2F.yml",
    "content": "auth:\n  credentials:\n  - password: PASSWORD\n    username: ADMIN\ncategory: http\ncomment: 'Version: 8.10f; Level: Administrator; '\nname: Nexsan - ATABoy2F\nport: 0\nvendor: NEXSAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/next/NeXTStep.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: me\n  - password: NeXT\n    username: root\n  - password: signa\n    username: signa\ncategory: multi\ncomment: 'Level: User; '\nname: NeXT - NeXTStep\nport: 0\nvendor: NEXT\n"
  },
  {
    "path": "totalpass/payloads/cirt/nice systems ltd/NICELog.yml",
    "content": "auth:\n  credentials:\n  - password: nicecti\n    username: Nice-admin\n  - password: nicecti\n    username: Administrator\ncategory: unknown\ncomment: 'Level: Administrator; Notes: This is the renamed Administrator account.; '\nname: NICE Systems Ltd. - NICELog\nport: 0\nvendor: NICE SYSTEMS LTD.\n"
  },
  {
    "path": "totalpass/payloads/cirt/niksun/NetDetector.yml",
    "content": "auth:\n  credentials:\n  - password: NetVCR\n    username: vcr\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Niksun - NetDetector\nport: 0\nvendor: NIKSUN\n"
  },
  {
    "path": "totalpass/payloads/cirt/nimble/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: xdfk9874t3\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Nimble - PC BIOS\nport: 0\nvendor: NIMBLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/nokia/770.yml",
    "content": "auth:\n  credentials:\n  - password: rootme\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Nokia - 770\nport: 0\nvendor: NOKIA\n"
  },
  {
    "path": "totalpass/payloads/cirt/nokia/M10.yml",
    "content": "auth:\n  credentials:\n  - password: Telecom\n    username: Telecom\ncategory: unknown\ncomment: ''\nname: Nokia - M10\nport: 0\nvendor: NOKIA\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Accelar (Passport) 1000 series routing switches.yml",
    "content": "auth:\n  credentials:\n  - password: ro\n    username: ro\n  - password: rw\n    username: rw\n  - password: rwa\n    username: rwa\n  - password: l2\n    username: l2\n  - password: l3\n    username: l3\ncategory: multi\ncomment: 'Level: Read Only; '\nname: Nortel - Accelar (Passport) 1000 series routing switches\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/BCM.yml",
    "content": "auth:\n  credentials:\n  - password: PlsChgMe!\n    username: administrator\n  - password: visor\n    username: supervisor\ncategory: unknown\ncomment: 'Version: 3.5 - 3-7; Level: Administrator; '\nname: Nortel - BCM\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/BayStack.yml",
    "content": "auth:\n  credentials:\n  - password: secure\n    username: ''\n  - password: ''\n    username: ''\ncategory: unknown\ncomment: 'Version: 310/303; Level: Administrator; '\nname: Nortel - BayStack\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Contivity Switch.yml",
    "content": "auth:\n  credentials:\n  - password: setup\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Nortel - Contivity Switch\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Extranet Switches.yml",
    "content": "auth:\n  credentials:\n  - password: setup\n    username: admin\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Nortel - Extranet Switches\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/MIPCD - ftp.yml",
    "content": "auth:\n  credentials:\n  - password: user\n    username: user\ncategory: ftp\ncomment: 'Version: 1.04; Level: Read-Write; '\nname: Nortel - MIPCD - ftp\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/MIPCD - http.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 1.04; Level: Administrator; '\nname: Nortel - MIPCD - http\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/MIPCD.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: user\n  - password: ''\n    username: ''\n  - password: user\n    username: user\n  - password: ''\n    username: user\ncategory: unknown\ncomment: 'Version: 1.5; Level: Administrator; '\nname: Nortel - MIPCD\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/MIRAN - unknown.yml",
    "content": "auth:\n  credentials:\n  - password: distrib0\n    username: distrib\ncategory: unknown\ncomment: ''\nname: Nortel - MIRAN - unknown\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/MIRAN.yml",
    "content": "auth:\n  credentials:\n  - password: admin000\n    username: admin\ncategory: serial\ncomment: 'Version: 3.XX; Level: Administrator; '\nname: Nortel - MIRAN\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Meridian Integrated Conference Bridge - ftp.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: conferencing\ncategory: ftp\ncomment: 'Level: Administrator; Doc: http://support.avaya.com/css/P8/documents/100097575; '\nname: Nortel - Meridian Integrated Conference Bridge - ftp\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Meridian Integrated Conference Bridge - http.yml",
    "content": "auth:\n  credentials:\n  - password: '000000'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://support.avaya.com/css/P8/documents/100097575; '\nname: Nortel - Meridian Integrated Conference Bridge - http\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Meridian Integrated Conference Bridge.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\n  - password: admin\n    username: conferencing\n  - password: gubed\n    username: debug\ncategory: telnet\ncomment: 'Level: Administrator; Doc: http://support.avaya.com/css/P8/documents/100097575; '\nname: Nortel - Meridian Integrated Conference Bridge\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Meridian Link-CCR-Max - modem.yml",
    "content": "auth:\n  credentials:\n  - password: etas\n    username: disttech\ncategory: modem\ncomment: ''\nname: Nortel - Meridian Link/CCR/Max - modem\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Meridian Link-CCR-Max - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: etas\n    username: disttech\ncategory: telnet\ncomment: ''\nname: Nortel - Meridian Link/CCR/Max - telnet\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Meridian Link-CCR-Max.yml",
    "content": "auth:\n  credentials:\n  - password: disttech\n    username: disttech\ncategory: unknown\ncomment: ''\nname: Nortel - Meridian Link/CCR/Max\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Meridian Mail.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: adminpwd\n    username: system\ncategory: ax in serial\ncomment: 'Version: 10.XX; Level: Administrator; '\nname: Nortel - Meridian Mail\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Meridian PBX.yml",
    "content": "auth:\n  credentials:\n  - password: '0000'\n    username: login\n  - password: '0000'\n    username: spcl\n  - password: '0'\n    username: login\n  - password: '0'\n    username: spcl\ncategory: serial\ncomment: 'Notes: AUTH codes in LD 8; '\nname: Nortel - Meridian PBX\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Passport 8000 Series Switch.yml",
    "content": "auth:\n  credentials:\n  - password: ro\n    username: ''\n  - password: rw\n    username: ''\n  - password: rwa\n    username: ''\n  - password: l1\n    username: ''\n  - password: l2\n    username: ''\ncategory: command line\ncomment: 'Level: Read Only; '\nname: Nortel - Passport 8000 Series Switch\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Remote Office 9150.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: admin\ncategory: client\ncomment: 'Level: Administrator; '\nname: Nortel - Remote Office 9150\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Symposium.yml",
    "content": "auth:\n  credentials:\n  - password: nortel\n    username: sysadmin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Nortel - Symposium\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nortel/Tasman.yml",
    "content": "auth:\n  credentials:\n  - password: tasmannet\n    username: tasman\ncategory: unknown\ncomment: ''\nname: Nortel - Tasman\nport: 0\nvendor: NORTEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/novell/Groupwise 5.5 Enhancement Pack.yml",
    "content": "auth:\n  credentials:\n  - password: manager\n    username: servlet\ncategory: multi\ncomment: ''\nname: Novell - Groupwise 5.5 Enhancement Pack\nport: 0\nvendor: NOVELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/novell/Groupwise 6.0.yml",
    "content": "auth:\n  credentials:\n  - password: manager\n    username: servlet\ncategory: multi\ncomment: ''\nname: Novell - Groupwise 6.0\nport: 0\nvendor: NOVELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/novell/NDS iMonitor.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: sadmin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Novell - NDS iMonitor\nport: 0\nvendor: NOVELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/novell/Netware.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ADMIN\n  - password: ''\n    username: ADMIN\n  - password: ''\n    username: ARCHIVIST\n  - password: ARCHIVIST\n    username: ARCHIVIST\n  - password: ''\n    username: BACKUP\n  - password: BACKUP\n    username: BACKUP\n  - password: CHEY_ARCHSVR\n    username: CHEY_ARCHSVR\n  - password: ''\n    username: CHEY_ARCHSVR\n  - password: FAX\n    username: FAX\n  - password: ''\n    username: FAX\n  - password: FAXUSER\n    username: FAXUSER\n  - password: ''\n    username: FAXUSER\n  - password: ''\n    username: FAXWORKS\n  - password: FAXWORKS\n    username: FAXWORKS\n  - password: GATEWAY\n    username: GATEWAY\n  - password: ''\n    username: GATEWAY\n  - password: TSEUG\n    username: GUEST\n  - password: GUESTGUEST\n    username: GUEST\n  - password: GUESTGUE\n    username: GUEST\n  - password: GUEST\n    username: GUEST\n  - password: ''\n    username: GUEST\n  - password: ''\n    username: HPLASER\n  - password: HPLASER\n    username: HPLASER\n  - password: ''\n    username: LASER\n  - password: LASER\n    username: LASER\n  - password: LASERWRITER\n    username: LASERWRITER\n  - password: ''\n    username: LASERWRITER\n  - password: ''\n    username: MAIL\n  - password: MAIL\n    username: MAIL\n  - password: ''\n    username: POST\n  - password: POST\n    username: POST\n  - password: ''\n    username: PRINT\n  - password: PRINT\n    username: PRINT\n  - password: ''\n    username: PRINTER\n  - password: PRINTER\n    username: PRINTER\n  - password: ''\n    username: ROOT\n  - password: ROOT\n    username: ROOT\n  - password: ''\n    username: ROUTER\n  - password: ''\n    username: SABRE\n  - password: NETFRAME\n    username: SUPERVISOR\n  - password: NFI\n    username: SUPERVISOR\n  - password: NF\n    username: SUPERVISOR\n  - password: HARRIS\n    username: SUPERVISOR\n  - password: SUPERVISOR\n    username: SUPERVISOR\n  - password: ''\n    username: SUPERVISOR\n  - password: SYSTEM\n    username: SUPERVISOR\n  - password: TEST\n    username: TEST\n  - password: ''\n    username: TEST\n  - password: ''\n    username: USER_TEMPLATE\n  - password: USER_TEMPLATE\n    username: USER_TEMPLATE\n  - password: ''\n    username: WANGTEK\n  - password: WANGTEK\n    username: WANGTEK\n  - password: WINDOWS_PASSTHRU\n    username: WINDOWS_PASSTHRU\n  - password: ''\n    username: WINDOWS_PASSTHRU\n  - password: SABRE\n    username: WINSABRE\n  - password: WINSABRE\n    username: WINSABRE\ncategory: multi\ncomment: ''\nname: Novell - Netware\nport: 0\nvendor: NOVELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/novell/Vibe.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://www.novell.com/documentation/vibe32/vibe32_admin/data/brchh4k.html; '\nname: Novell - Vibe\nport: 0\nvendor: NOVELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/novell/iManager.yml",
    "content": "auth:\n  credentials:\n  - password: novell\n    username: admin\ncategory: unknown\ncomment: 'Version: 2.0.1; Level: Administrator; '\nname: Novell - iManager\nport: 0\nvendor: NOVELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/nsi/vmXfw.yml",
    "content": "auth:\n  credentials:\n  - password: nsi\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.nsi.com.au/vmpfw-install.htm; '\nname: NSI - vmXfw\nport: 0\nvendor: NSI\n"
  },
  {
    "path": "totalpass/payloads/cirt/nurit/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: $system\ncategory: console\ncomment: 'Level: Administrator; '\nname: Nurit - PC BIOS\nport: 0\nvendor: NURIT\n"
  },
  {
    "path": "totalpass/payloads/cirt/ods/1094.yml",
    "content": "auth:\n  credentials:\n  - password: ods\n    username: ods\ncategory: unknown\ncomment: ''\nname: ODS - 1094\nport: 0\nvendor: ODS\n"
  },
  {
    "path": "totalpass/payloads/cirt/oleg khabarov/Comfy CMS.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: username\ncategory: http\ncomment: 'Level: Administrator; Doc: https://github.com/comfy/comfortable-mexican-sofa/wiki/Installation-and-Quick-Start-Guide#quick-start-guide;\n  Notes: http://0.0.0.0:3000/admin ComfortableMexicanSofa; '\nname: Oleg Khabarov - Comfy CMS\nport: 0\nvendor: OLEG KHABAROV\n"
  },
  {
    "path": "totalpass/payloads/cirt/open source point of sale/Open Source Point of Sale.yml",
    "content": "auth:\n  credentials:\n  - password: pointofsale\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://github.com/opensourcepos/opensourcepos/blob/master/INSTALL.md; '\nname: Open Source Point of Sale - Open Source Point of Sale\nport: 0\nvendor: OPEN SOURCE POINT OF SALE\n"
  },
  {
    "path": "totalpass/payloads/cirt/open-xchange inc/Open-Xchange Server.yml",
    "content": "auth:\n  credentials:\n  - password: secret\n    username: mailadmin\ncategory: unknown\ncomment: 'Version: 5; Level: Administrator; '\nname: Open-Xchange Inc. - Open-Xchange Server\nport: 0\nvendor: OPEN-XCHANGE INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/openlink/Administration Assistant.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: administrator; '\nname: Openlink - Administration Assistant\nport: 0\nvendor: OPENLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/openmarket/Content Server.yml",
    "content": "auth:\n  credentials:\n  - password: hello\n    username: Coco\n  - password: hello\n    username: Bobo\n  - password: hello\n    username: Flo\n  - password: hello\n    username: Joe\n  - password: hello\n    username: Moe\n  - password: demo\n    username: admin\n  - password: demo\n    username: user_analyst\n  - password: demo\n    username: user_approver\n  - password: demo\n    username: user_author\n  - password: demo\n    username: user_checker\n  - password: demo\n    username: user_designer\n  - password: demo\n    username: user_editor\n  - password: demo\n    username: user_expert\n  - password: demo\n    username: user_marketer\n  - password: demo\n    username: user_pricer\n  - password: demo\n    username: user_publisher\ncategory: http\ncomment: ''\nname: OpenMarket - Content Server\nport: 0\nvendor: OPENMARKET\n"
  },
  {
    "path": "totalpass/payloads/cirt/optivision/Nac 3000.yml",
    "content": "auth:\n  credentials:\n  - password: mpegvideo\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Optivision - Nac 3000\nport: 0\nvendor: OPTIVISION\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/APEX.yml",
    "content": "auth:\n  credentials:\n  - password: oracle\n    username: oracle\ncategory: http\ncomment: 'Level: Administrator; Doc: https://community.oracle.com/message/9332377;\n  Notes: Application Express Administration Services; '\nname: Oracle - APEX\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/ATG Web Commerce.yml",
    "content": "auth:\n  credentials:\n  - password: siteadmin\n    username: siteadmin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://docs.oracle.com/cd/E24152_01/Platform.10-1/ATGMultisiteAdminGuide/html/s1505accesscontrol01.html; '\nname: Oracle - ATG Web Commerce\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/Database.yml",
    "content": "auth:\n  credentials:\n  - password: welcome\n    username: admin\ncategory: unknown\ncomment: 'Version: OC4J 10g (10.1.3) Developer Preview; '\nname: Oracle - Database\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/Dynamo Administration UI.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://docs.oracle.com/cd/E22630_01/Platform.1002/pdf/ATGInstallGuide.pdf; '\nname: Oracle - Dynamo Administration UI\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/Exadata.yml",
    "content": "auth:\n  credentials:\n  - password: ilom-admin\n    username: ilom-admin\n  - password: ilom-operator\n    username: ilom-operator\n  - password: nm2user\n    username: nm2user\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://seclists.org/fulldisclosure/2012/Nov/229; '\nname: Oracle - Exadata\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/Internet Directory Service.yml",
    "content": "auth:\n  credentials:\n  - password: welcome\n    username: cn=orcladmin\ncategory: unknown\ncomment: ''\nname: Oracle - Internet Directory Service\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/Oracle BPEL Process Manager.yml",
    "content": "auth:\n  credentials:\n  - password: bpel\n    username: bpel\ncategory: unknown\ncomment: ''\nname: Oracle - Oracle BPEL Process Manager\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/Oracle.yml",
    "content": "auth:\n  credentials:\n  - password: LBACSYS\n    username: LBACSYS\n  - password: OAS_PUBLIC\n    username: OAS_PUBLIC\n  - password: MXAGENT\n    username: MXAGENT\n  - password: MTS_PASSWORD\n    username: MTS_USER\n  - password: PASSWORD\n    username: MASTER\n  - password: SHELVES\n    username: LIBRARIAN\n  - password: IMEDIA\n    username: IMEDIA\n  - password: SNOWMAN\n    username: FROSTY\n  - password: ESTORE\n    username: ESTOREUSER\n  - password: EJSADMIN\n    username: EJSADMIN\n  - password: DES\n    username: DES\n  - password: MUMBLEFRATZ\n    username: DBI\n  - password: PASSWORD\n    username: CQSCHEMAUSER\n  - password: COMPIERE\n    username: COMPIERE\n  - password: WELCOME\n    username: ADMIN\n  - password: CISINFO\n    username: CISINFO\n  - password: CIS\n    username: CIS\n  - password: CIDS\n    username: CIDS\n  - password: BC4J\n    username: BC4J\n  - password: AQ\n    username: AQ\n  - password: CENTRA\n    username: CENTRA\n  - password: JETSPEED\n    username: ADMIN\n  - password: WOOD\n    username: ADAMS\n  - password: ADLDEMO\n    username: ADLDEMO\n  - password: FND\n    username: APPLSYS\n  - password: FNDPUB\n    username: APPLSYSPUB\n  - password: APPS\n    username: APPS\n  - password: AQDEMO\n    username: AQDEMO\n  - password: AQJAVA\n    username: AQJAVA\n  - password: AQUSER\n    username: AQUSER\n  - password: AUDIOUSER\n    username: AUDIOUSER\n  - password: ''\n    username: AURORA$JIS$UTILITY$\n  - password: INVALID\n    username: AURORA$ORB$UNAUTHENTICATED\n  - password: PAPER\n    username: BLAKE\n  - password: CATALOG\n    username: CATALOG\n  - password: CDEMO82\n    username: CDEMO82\n  - password: CDEMORID\n    username: CDEMORID\n  - password: CDEMOUCB\n    username: CDEMOUCB\n  - password: CLOTH\n    username: CLARK\n  - password: COMPANY\n    username: COMPANY\n  - password: CSMIG\n    username: CSMIG\n  - password: CTXDEMO\n    username: CTXDEMO\n  - password: CTXSYS\n    username: CTXSYS\n  - password: DBSNMP\n    username: DBSNMP\n  - password: MDSYS\n    username: MDSYS\n  - password: DEMO9\n    username: DEMO9\n  - password: EMP\n    username: EMP\n  - password: EVENT\n    username: EVENT\n  - password: FINANCE\n    username: FINANCE\n  - password: FND\n    username: FND\n  - password: GPLD\n    username: GPLD\n  - password: GPFD\n    username: GPFD\n  - password: HLW\n    username: HLW\n  - password: HR\n    username: HR\n  - password: IMAGEUSER\n    username: IMAGEUSER\n  - password: JMUSER\n    username: JMUSER\n  - password: STEEL\n    username: JONES\n  - password: MFG\n    username: MFG\n  - password: MIGRATE\n    username: MIGRATE\n  - password: MILLER\n    username: MILLER\n  - password: MMO2\n    username: MMO2\n  - password: MOREAU\n    username: MOREAU\n  - password: 'YES'\n    username: MODTEST\n  - password: MTSSYS\n    username: MTSSYS\n  - password: NAMES\n    username: NAMES\n  - password: OCITEST\n    username: OCITEST\n  - password: ODS\n    username: ODS\n  - password: OE\n    username: OE\n  - password: OLAPDBA\n    username: OLAPDBA\n  - password: PM\n    username: PM\n  - password: INSTANCE\n    username: OLAPSVR\n  - password: MANAGER\n    username: OLAPSYS\n  - password: (random password)\n    username: ORACACHE\n  - password: ORDPLUGINS\n    username: ORDPLUGINS\n  - password: ORDSYS\n    username: ORDSYS\n  - password: (random password)\n    username: OSE$HTTP$ADMIN\n  - password: OUTLN\n    username: OUTLN\n  - password: PERFSTAT\n    username: PERFSTAT\n  - password: PO\n    username: PO\n  - password: PO7\n    username: PO7\n  - password: PORTAL31\n    username: PORTAL30\n  - password: PORTAL30_DEMO\n    username: PORTAL30_DEMO\n  - password: PORTAL30_PUBLIC\n    username: PORTAL30_PUBLIC\n  - password: PORTAL30_SSO\n    username: PORTAL30_SSO\n  - password: PORTAL30_SSO_PS\n    username: PORTAL30_SSO_PS\n  - password: PORTAL30_SSO_PUBLIC\n    username: PORTAL30_SSO_PUBLIC\n  - password: POWERCARTUSER\n    username: POWERCARTUSER\n  - password: PRIMARY\n    username: PRIMARY\n  - password: PUBSUB\n    username: PUBSUB\n  - password: QS\n    username: QS\n  - password: QS_ADM\n    username: QS_ADM\n  - password: QS_CB\n    username: QS_CB\n  - password: QS_CBADM\n    username: QS_CBADM\n  - password: QS_CS\n    username: QS_CS\n  - password: QS_ES\n    username: QS_ES\n  - password: QS_OS\n    username: QS_OS\n  - password: QS_WS\n    username: QS_WS\n  - password: RE\n    username: RE\n  - password: REPADMIN\n    username: REPADMIN\n  - password: RMAIL\n    username: RMAIL\n  - password: RMAN\n    username: RMAN\n  - password: SAMPLE\n    username: SAMPLE\n  - password: SECDEMO\n    username: SECDEMO\n  - password: SH\n    username: SH\n  - password: SYSADM\n    username: SYSADM\n  - password: TRACE\n    username: TRACESVR\n  - password: TSDEV\n    username: TSDEV\n  - password: TSUSER\n    username: TSUSER\n  - password: USER0\n    username: USER0\n  - password: USER1\n    username: USER1\n  - password: USER2\n    username: USER2\n  - password: USER3\n    username: USER3\n  - password: USER4\n    username: USER4\n  - password: USER5\n    username: USER5\n  - password: USER6\n    username: USER6\n  - password: USER7\n    username: USER7\n  - password: USER8\n    username: USER8\n  - password: USER9\n    username: USER9\n  - password: UTLESTAT\n    username: UTLBSTATU\n  - password: VIDEO USER\n    username: VIDEOUSER\n  - password: VIF_DEV_PWD\n    username: VIF_DEVELOPER\n  - password: VIRUSER\n    username: VIRUSER\n  - password: VRR1\n    username: VRR1\n  - password: WKSYS\n    username: WKSYS\n  - password: ''\n    username: CTXSYS\n  - password: DEMO8\n    username: DEMO8\n  - password: CDEMOCOR\n    username: CDEMOCOR\n  - password: ODSCOMMON\n    username: ODSCOMMON\n  - password: OEMADM\n    username: OEMADM\n  - password: ORACLE\n    username: OMWB_EMULATION\n  - password: OPENSPIRIT\n    username: OPENSPIRIT\n  - password: ORAREGSYS\n    username: ORAREGSYS\n  - password: OSP22\n    username: OSP22\n  - password: OWA\n    username: OWA\n  - password: OWA_PUBLIC\n    username: OWA_PUBLIC\n  - password: PANAMA\n    username: PANAMA\n  - password: PATROL\n    username: PATROL\n  - password: SUPERSECRET\n    username: PLSQL\n  - password: DEMO\n    username: REP_MANAGER\n  - password: DEMO\n    username: REP_OWNER\n  - password: REP_OWNER\n    username: REP_OWNER\n  - password: SAPR3\n    username: SAP\n  - password: SDOS_ICSAP\n    username: SDOS_ICSAP\n  - password: SITEMINDER\n    username: SITEMINDER\n  - password: SLIDEPW\n    username: SLIDE\n  - password: STARTER\n    username: STARTER\n  - password: STRAT_PASSWD\n    username: STRAT_USER\n  - password: SWPRO\n    username: SWPRO\n  - password: SWUSER\n    username: SWUSER\n  - password: SYMPA\n    username: SYMPA\n  - password: OEM_TEMP\n    username: SYSMAN\n  - password: TAHITI\n    username: TAHITI\n  - password: TDOS_ICSAP\n    username: TDOS_ICSAP\n  - password: TESTPILOT\n    username: TESTPILOT\n  - password: TRAVEL\n    username: TRAVEL\n  - password: TURBINE\n    username: TURBINE\n  - password: ULTIMATE\n    username: ULTIMATE\n  - password: USER\n    username: USER\n  - password: WEBCAL01\n    username: WEBCAL01\n  - password: WEBDB\n    username: WEBDB\n  - password: WEBREAD\n    username: WEBREAD\n  - password: WWW\n    username: WWW\n  - password: WWWUSER\n    username: WWWUSER\n  - password: XPRT\n    username: XPRT\n  - password: ADMINISTRATOR\n    username: ADMINISTRATOR\n  - password: admin\n    username: ADMINISTRATOR\n  - password: SWORDFISH\n    username: ANDY\n  - password: AP\n    username: AP\n  - password: APPUSER\n    username: APPUSER\n  - password: BRIO_ADMIN\n    username: BRIO_ADMIN\n  - password: DEV2000_DEMOS\n    username: DEV2000_DEMOS\n  - password: DISCOVERER_ADMIN\n    username: DISCOVERER_ADMIN\n  - password: DSGATEWAY\n    username: DSGATEWAY\n  - password: DSSYS\n    username: DSSYS\n  - password: GL\n    username: GL\n  - password: HCPARK\n    username: HCPARK\n  - password: AIROPLANE\n    username: JWARD\n  - password: L2LDEMO\n    username: L2LDEMO\n  - password: MDDEMO\n    username: MDDEMO\n  - password: CLERK\n    username: MDDEMO_CLERK\n  - password: MGR\n    username: MDDEMO_MGR\n  - password: MGWUSER\n    username: MGWUSER\n  - password: ODM\n    username: ODM\n  - password: MTRPW\n    username: ODM_MTR\n  - password: OEMREP\n    username: OEMREP\n  - password: OO\n    username: OO\n  - password: ORASSO\n    username: ORASSO\n  - password: OWNER\n    username: OWNER\n  - password: PLEX\n    username: PLEX\n  - password: PORTAL30\n    username: PORTAL30\n  - password: PUBSUB1\n    username: PUBSUB1\n  - password: QDBA\n    username: QDBA\n  - password: OEM_TEMP\n    username: REPORTS_USER\n  - password: SERVICECONSUMER1\n    username: SERVICECONSUMER1\n  - password: D_SYSPW\n    username: SYS\n  - password: D_SYSTPW\n    username: SYSTEM\n  - password: oracle\n    username: internal\n  - password: tiger or tigger\n    username: scott\n  - password: manager\n    username: system\n  - password: change_on_install\n    username: sys\n  - password: demo\n    username: demo\n  - password: oracle\n    username: oracle\n  - password: sys\n    username: sys\n  - password: DIP\n    username: DIP\n  - password: EXFSYS\n    username: EXFSYS\ncategory: unknown\ncomment: ''\nname: Oracle - Oracle\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/Personal Oracle.yml",
    "content": "auth:\n  credentials:\n  - password: PO8\n    username: PO8\ncategory: multi\ncomment: 'Version: 8; '\nname: Oracle - Personal Oracle\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/Sun Java System Access Manager.yml",
    "content": "auth:\n  credentials:\n  - password: adminadmin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.oracle.com/technetwork/java/install-139173.html;\n  Notes: Application Server Administration Console; '\nname: Oracle - Sun Java System Access Manager\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/WebLogic - http.yml",
    "content": "auth:\n  credentials:\n  - password: weblogic\n    username: weblogic\ncategory: http\ncomment: 'Level: Administrator; Notes: Login located at /console; '\nname: Oracle - WebLogic - http\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/WebLogic Process Integrator.yml",
    "content": "auth:\n  credentials:\n  - password: security\n    username: system\n  - password: security\n    username: admin\n  - password: password\n    username: mary\n  - password: password\n    username: joe\n  - password: wlpisystem\n    username: wlpisystem\n  - password: wlcsystem\n    username: wlcsystem\ncategory: unknown\ncomment: 'Version: 2.0; '\nname: Oracle - WebLogic Process Integrator\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/oracle/WebLogic.yml",
    "content": "auth:\n  credentials:\n  - password: weblogic\n    username: weblogic\ncategory: unknown\ncomment: 'Version: 9.0 Beta (Diablo); '\nname: Oracle - WebLogic\nport: 0\nvendor: ORACLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/osicom/JETXPrint.yml",
    "content": "auth:\n  credentials:\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\ncategory: telnet\ncomment: 'Version: 1000E/B; Level: Administrator; '\nname: Osicom - JETXPrint\nport: 0\nvendor: OSICOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/osicom/NETCommuter Remote Access Server.yml",
    "content": "auth:\n  credentials:\n  - password: sysadm\n    username: sysadm\n  - password: Manager\n    username: Manager\n  - password: guest\n    username: guest\n  - password: echo\n    username: echo\n  - password: d.e.b.u.g\n    username: debug\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Osicom - NETCommuter Remote Access Server\nport: 0\nvendor: OSICOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/osicom/NETPrint.yml",
    "content": "auth:\n  credentials:\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: Manager\n    username: Manager\n  - password: guest\n    username: guest\n  - password: echo\n    username: echo\n  - password: d.e.b.u.g\n    username: debug\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: Manager\n    username: Manager\n  - password: guest\n    username: guest\n  - password: echo\n    username: echo\n  - password: d.e.b.u.g\n    username: debug\n  - password: sysadm\n    username: sysadm\n  - password: Manager\n    username: Manager\n  - password: guest\n    username: guest\n  - password: echo\n    username: echo\n  - password: d.e.b.u.g\n    username: debug\n  - password: sysadm\n    username: sysadm\n  - password: Manager\n    username: Manager\n  - password: guest\n    username: guest\n  - password: echo\n    username: echo\n  - password: d.e.b.u.g\n    username: debug\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: Manager\n    username: Manager\n  - password: guest\n    username: guest\n  - password: echo\n    username: echo\n  - password: d.e.b.u.g\n    username: debug\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\n  - password: sysadm\n    username: sysadm\ncategory: telnet\ncomment: 'Version: 1000 T/B; Level: Administrator; '\nname: Osicom - NETPrint\nport: 0\nvendor: OSICOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/osicom/Osicom Plus T1-PLUS 56k.yml",
    "content": "auth:\n  credentials:\n  - password: private\n    username: write\ncategory: telnet\ncomment: ''\nname: Osicom - Osicom Plus T1/PLUS 56k\nport: 0\nvendor: OSICOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/otrs inc/OTRS.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: root@localhost\ncategory: http\ncomment: 'Level: Administrator; Doc: http://doc.otrs.org/2.4/en/html/c444.html; '\nname: OTRS Inc. - OTRS\nport: 0\nvendor: OTRS INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/overland storage/SAN Storage.yml",
    "content": "auth:\n  credentials:\n  - password: Password\n    username: root\ncategory: http\ncomment: 'Level: Administrator; '\nname: Overland Storage - SAN Storage\nport: 0\nvendor: OVERLAND STORAGE\n"
  },
  {
    "path": "totalpass/payloads/cirt/ovislink canada inc/SHDSL Modem.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: root\n  - password: user\n    username: user\ncategory: unknown\ncomment: 'Version: B5.1 5-15-2002; Level: Administrator; '\nname: OvisLink Canada Inc. - SHDSL Modem\nport: 0\nvendor: OVISLINK CANADA INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/packard bell/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: bell9\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Packard Bell - PC BIOS\nport: 0\nvendor: PACKARD BELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/packeteer/Packetshaper.yml",
    "content": "auth:\n  credentials:\n  - password: touchpwd=\n    username: ''\ncategory: console\ncomment: 'Level: touch; Notes: Resets ''touch'' password.; '\nname: Packeteer - Packetshaper\nport: 0\nvendor: PACKETEER\n"
  },
  {
    "path": "totalpass/payloads/cirt/panasonic/Network Camera.yml",
    "content": "auth:\n  credentials:\n  - password: '12345'\n    username: admin\ncategory: http\ncomment: 'Version: WV-NS202A; Level: Administrator; Doc: ftp://ftp.panasonic.com/pub/Panasonic/cctv/OperatingInstructions/WV-NS202A-Operating-Instructions.pdf; '\nname: Panasonic - Network Camera\nport: 0\nvendor: PANASONIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/pandatel/EMUX.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Pandatel - EMUX\nport: 0\nvendor: PANDATEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/parallels/Plesk.yml",
    "content": "auth:\n  credentials:\n  - password: setup\n    username: admin\ncategory: http\ncomment: 'Version: 6, 7; Level: Administrator; '\nname: Parallels - Plesk\nport: 0\nvendor: PARALLELS\n"
  },
  {
    "path": "totalpass/payloads/cirt/parrot/MKi9100.yml",
    "content": "auth:\n  credentials:\n  - password: '0000'\n    username: ''\ncategory: unknown\ncomment: 'Notes: Pairing Code; '\nname: Parrot - MKi9100\nport: 0\nvendor: PARROT\n"
  },
  {
    "path": "totalpass/payloads/cirt/patton/RAS.yml",
    "content": "auth:\n  credentials:\n  - password: superuser\n    username: superuser\n  - password: monitor\n    username: monitor\ncategory: unknown\ncomment: 'Version: 2; '\nname: Patton - RAS\nport: 0\nvendor: PATTON\n"
  },
  {
    "path": "totalpass/payloads/cirt/pbx/PBX (Generic).yml",
    "content": "auth:\n  credentials:\n  - password: nician\n    username: tech\ncategory: unknown\ncomment: ''\nname: PBX - PBX (Generic)\nport: 0\nvendor: PBX\n"
  },
  {
    "path": "totalpass/payloads/cirt/phpliteadmin/phpLiteAdmin.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; Doc: https://bitbucket.org/phpliteadmin/public/wiki/Configuration; '\nname: phpLiteAdmin - phpLiteAdmin\nport: 0\nvendor: PHPLITEADMIN\n"
  },
  {
    "path": "totalpass/payloads/cirt/phpmyadmin/phpMyAdmin.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: root\ncategory: http\ncomment: 'Level: Administrator; '\nname: phpMyAdmin - phpMyAdmin\nport: 0\nvendor: PHPMYADMIN\n"
  },
  {
    "path": "totalpass/payloads/cirt/phpreactor/PHPReactor.yml",
    "content": "auth:\n  credentials:\n  - password: phpreactor\n    username: core\ncategory: http\ncomment: 'Version: 1.2.7; Doc: http://freshmeat.net/projects/phpreactor/; '\nname: PHPReactor - PHPReactor\nport: 0\nvendor: PHPREACTOR\n"
  },
  {
    "path": "totalpass/payloads/cirt/phptest/phpTest.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\n  - password: guest\n    username: guest\ncategory: http\ncomment: 'Version: 0.5.6; Level: Administrator; '\nname: phpTest - phpTest\nport: 0\nvendor: PHPTEST\n"
  },
  {
    "path": "totalpass/payloads/cirt/pikatel/All.yml",
    "content": "auth:\n  credentials:\n  - password: DSL\n    username: DSL\ncategory: unknown\ncomment: ''\nname: Pikatel - All\nport: 0\nvendor: PIKATEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/pirelli/Age UB.yml",
    "content": "auth:\n  credentials:\n  - password: microbusiness\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Pirelli - Age UB\nport: 0\nvendor: PIRELLI\n"
  },
  {
    "path": "totalpass/payloads/cirt/pivotal software inc/RabbitMQ Management Plugin.yml",
    "content": "auth:\n  credentials:\n  - password: guest\n    username: guest\ncategory: http\ncomment: 'Level: Administrator; Doc: https://www.rabbitmq.com/management.html; Notes:\n  Port 15672; '\nname: Pivotal Software, Inc. - RabbitMQ Management Plugin\nport: 0\nvendor: PIVOTAL SOFTWARE, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/plaintree/Waveswitch.yml",
    "content": "auth:\n  credentials:\n  - password: default.password\n    username: (blank)\ncategory: unknown\ncomment: ''\nname: PlainTree - Waveswitch\nport: 0\nvendor: PLAINTREE\n"
  },
  {
    "path": "totalpass/payloads/cirt/planet technology corp/FGSW-2402RS.yml",
    "content": "auth:\n  credentials:\n  - password: ISPMODE\n    username: admin\n  - password: '[^_^]'\n    username: admin\ncategory: serial\ncomment: 'Level: Administrator; '\nname: PLANET Technology Corp. - FGSW-2402RS\nport: 0\nvendor: PLANET TECHNOLOGY CORP.\n"
  },
  {
    "path": "totalpass/payloads/cirt/pokertracker software/PokerTracker 3.yml",
    "content": "auth:\n  credentials:\n  - password: svcPASS83\n    username: postgres\n  - password: dbpass\n    username: postgres\ncategory: postgresql\ncomment: 'Version: 3.00 Build 5; Level: Administrator; Doc: http://www.pokertracker.com/products/PT3/docs/PokerTracker3_Quick_Start_Guide.pdf; '\nname: PokerTracker Software - PokerTracker 3\nport: 0\nvendor: POKERTRACKER SOFTWARE\n"
  },
  {
    "path": "totalpass/payloads/cirt/pollsafe/Pollsafe.yml",
    "content": "auth:\n  credentials:\n  - password: SECONDARY\n    username: SMDR\ncategory: modem\ncomment: ''\nname: Pollsafe - Pollsafe\nport: 0\nvendor: POLLSAFE\n"
  },
  {
    "path": "totalpass/payloads/cirt/polycom/Soundstation IP.yml",
    "content": "auth:\n  credentials:\n  - password: '* * #'\n    username: administrator\ncategory: http\ncomment: 'Version: 3000; Level: Administrator; '\nname: Polycom - Soundstation IP\nport: 0\nvendor: POLYCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/polycom/Soundstation-SoundPoint IP.yml",
    "content": "auth:\n  credentials:\n  - password: '456'\n    username: Polycom\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://support.polycom.com/global/documents/support/technical/products/voice/SoundPointIP_Resetting_Log_Files_QT18298.pdf; '\nname: Polycom - Soundstation/SoundPoint IP\nport: 0\nvendor: POLYCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/polycom/ViewStation 4000.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: (blank)\n  - password: ''\n    username: ''\n  - password: x6zynd56\n    username: ''\ncategory: http\ncomment: 'Version: v.35; '\nname: Polycom - ViewStation 4000\nport: 0\nvendor: POLYCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/polycom/WebOffice.yml",
    "content": "auth:\n  credentials:\n  - password: ACCORD\n    username: ''\ncategory: unknown\ncomment: 'Version: 7.0.1; Level: Administrator; Doc: http://www.polycom.com/common/pw_cmp_updateDocKeywords/0,1687,6312,00.pdf; '\nname: Polycom - WebOffice\nport: 0\nvendor: POLYCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/postgresql/PostgreSQL.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: postgres\ncategory: cli\ncomment: 'Level: Administrator; '\nname: PostgreSQL - PostgreSQL\nport: 0\nvendor: POSTGRESQL\n"
  },
  {
    "path": "totalpass/payloads/cirt/powerchute/UPS.yml",
    "content": "auth:\n  credentials:\n  - password: pwrchute\n    username: pwrchute\ncategory: unknown\ncomment: ''\nname: Powerchute - UPS\nport: 0\nvendor: POWERCHUTE\n"
  },
  {
    "path": "totalpass/payloads/cirt/powerlogic/EGX.yml",
    "content": "auth:\n  credentials:\n  - password: Gateway\n    username: Administrator\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.merlingerin.com/C12570CB00504485/all/83A902802C60F942412570D9003ABDC1/$File/63230-319-204.pdf; '\nname: POWERLOGIC - EGX\nport: 0\nvendor: POWERLOGIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/prestige/650.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Prestige - 650\nport: 0\nvendor: PRESTIGE\n"
  },
  {
    "path": "totalpass/payloads/cirt/prime/PrimeOS.yml",
    "content": "auth:\n  credentials:\n  - password: dos\n    username: dos\n  - password: fam\n    username: fam\n  - password: maint\n    username: maint\n  - password: primeos\n    username: prime\n  - password: prime\n    username: primeos\n  - password: primeos\n    username: primeos\n  - password: guest\n    username: guest\n  - password: guest\n    username: guest1\n  - password: guest1\n    username: guest1\n  - password: mail\n    username: mail\n  - password: mfd\n    username: mfd\n  - password: netlink\n    username: netlink\n  - password: prime\n    username: prime\n  - password: primenet\n    username: primenet\n  - password: primeos\n    username: primenet\n  - password: primos\n    username: primos_cs\n  - password: prime\n    username: primos_cs\n  - password: prime\n    username: system\n  - password: system\n    username: system\n  - password: tele\n    username: tele\n  - password: test\n    username: test\ncategory: multi\ncomment: 'Level: User; '\nname: Prime - PrimeOS\nport: 0\nvendor: PRIME\n"
  },
  {
    "path": "totalpass/payloads/cirt/primebase/SQL Database Server.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: Administrator\ncategory: unknown\ncomment: 'Version: 4.2; '\nname: PrimeBase - SQL Database Server\nport: 0\nvendor: PRIMEBASE\n"
  },
  {
    "path": "totalpass/payloads/cirt/promise technology inc/WebPAM.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: administrator\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.promise.com/media_bank/Download%20Bank/Manual/1_WebPAM%20User%20Manual%20v1.4.pdf; '\nname: Promise Technology, Inc. - WebPAM\nport: 0\nvendor: PROMISE TECHNOLOGY, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/proxicast/LAN-Cell Gateway GPRS-401.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.proxicast.com/support/files/GPRS-QuickStartGuide.pdf;\n  Notes: Default LAN IP 192.168.1.1.; '\nname: Proxicast - LAN-Cell Gateway GPRS-401\nport: 0\nvendor: PROXICAST\n"
  },
  {
    "path": "totalpass/payloads/cirt/proxim/AP-2000.yml",
    "content": "auth:\n  credentials:\n  - password: public\n    username: (blank)\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default SSID is tsunami; '\nname: Proxim - AP-2000\nport: 0\nvendor: PROXIM\n"
  },
  {
    "path": "totalpass/payloads/cirt/prtg/PRTG Network Monitor.yml",
    "content": "auth:\n  credentials:\n  - password: prtgadmin\n    username: prtgadmin\ncategory: unknown\ncomment: ''\nname: PRTG - PRTG Network Monitor\nport: 0\nvendor: PRTG\n"
  },
  {
    "path": "totalpass/payloads/cirt/q-tec/790RH.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Q-Tec - 790RH\nport: 0\nvendor: Q-TEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/qdi/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: QDI\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: QDI - PC BIOS\nport: 0\nvendor: QDI\n"
  },
  {
    "path": "totalpass/payloads/cirt/qdi/SpeedEasy BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: lesarotl\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: QDI - SpeedEasy BIOS\nport: 0\nvendor: QDI\n"
  },
  {
    "path": "totalpass/payloads/cirt/qnap/NAS (Multiple) - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; Doc: https://www.qnap-singapore.com/faqs/forgot-admin-username-and-password/; '\nname: QNAP - NAS (Multiple) - ssh\nport: 0\nvendor: QNAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/qnap/NAS (Multiple).yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://www.qnap-singapore.com/faqs/forgot-admin-username-and-password/; '\nname: QNAP - NAS (Multiple)\nport: 0\nvendor: QNAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/qualiteam/X-Cart.yml",
    "content": "auth:\n  credentials:\n  - password: master\n    username: master\ncategory: unknown\ncomment: ''\nname: QualiTeam - X-Cart\nport: 0\nvendor: QUALITEAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/quantex/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: teX1\n    username: ''\n  - password: xljlbj\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Quantex - PC BIOS\nport: 0\nvendor: QUANTEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/quest software/TOAD.yml",
    "content": "auth:\n  credentials:\n  - password: TOAD\n    username: TOAD\ncategory: unknown\ncomment: ''\nname: Quest Software - TOAD\nport: 0\nvendor: QUEST SOFTWARE\n"
  },
  {
    "path": "totalpass/payloads/cirt/questra corporation/IDM Application Suite.yml",
    "content": "auth:\n  credentials:\n  - password: questra\n    username: questra\n  - password: guest\n    username: guest\ncategory: http\ncomment: 'Level: Administrator; '\nname: Questra Corporation - IDM Application Suite\nport: 0\nvendor: QUESTRA CORPORATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/radvision/ECS Administrator.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Radvision - ECS Administrator\nport: 0\nvendor: RADVISION\n"
  },
  {
    "path": "totalpass/payloads/cirt/radvision/MCU-323.yml",
    "content": "auth:\n  credentials:\n  - password: MCUrv\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Radvision - MCU-323\nport: 0\nvendor: RADVISION\n"
  },
  {
    "path": "totalpass/payloads/cirt/raidzone/raid arrays.yml",
    "content": "auth:\n  credentials:\n  - password: raidzone\n    username: ''\ncategory: unknown\ncomment: ''\nname: Raidzone - raid arrays\nport: 0\nvendor: RAIDZONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/rainbow/IKEY.yml",
    "content": "auth:\n  credentials:\n  - password: rainbow\n    username: ''\n  - password: PASSWORD\n    username: ''\ncategory: unknown\ncomment: 'Version: 1000; Level: Administrator; Notes: password = pin; '\nname: Rainbow - IKEY\nport: 0\nvendor: RAINBOW\n"
  },
  {
    "path": "totalpass/payloads/cirt/rainer wichmann/Beltane.yml",
    "content": "auth:\n  credentials:\n  - password: wichmann\n    username: rainer\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://la-samhna.de/beltane/beltane_help/installing.html#POSTINSTALL; '\nname: Rainer Wichmann - Beltane\nport: 0\nvendor: RAINER WICHMANN\n"
  },
  {
    "path": "totalpass/payloads/cirt/ramp networks/WebRamp.yml",
    "content": "auth:\n  credentials:\n  - password: trancell\n    username: wradmin\ncategory: unknown\ncomment: ''\nname: Ramp Networks - WebRamp\nport: 0\nvendor: RAMP NETWORKS\n"
  },
  {
    "path": "totalpass/payloads/cirt/rapidstream/RapidStream Appliances.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: rsadmin\ncategory: multi\ncomment: 'Level: Administrator; '\nname: RapidStream - RapidStream Appliances\nport: 0\nvendor: RAPIDSTREAM\n"
  },
  {
    "path": "totalpass/payloads/cirt/raritan/KVM Switches.yml",
    "content": "auth:\n  credentials:\n  - password: raritan\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Raritan - KVM Switches\nport: 0\nvendor: RARITAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/raritan inc/Power IQ.yml",
    "content": "auth:\n  credentials:\n  - password: sl33p30F00dumass!\n    username: web_api\n  - password: raritan\n    username: epiq_api\n  - password: raritan\n    username: admin\ncategory: http\ncomment: 'Doc: http://seclists.org/fulldisclosure/2015/Sep/33; '\nname: Raritan Inc. - Power IQ\nport: 0\nvendor: RARITAN INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/raytalk/RB-300.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: RayTalk - RB-300\nport: 0\nvendor: RAYTALK\n"
  },
  {
    "path": "totalpass/payloads/cirt/rca/DCW615R.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: RCA - DCW615R\nport: 0\nvendor: RCA\n"
  },
  {
    "path": "totalpass/payloads/cirt/red hat inc/JBOSS.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://docs.jboss.org/jbossas/guides/installguide/r1/en/html_single/; '\nname: Red Hat, Inc - JBOSS\nport: 0\nvendor: RED HAT, INC\n"
  },
  {
    "path": "totalpass/payloads/cirt/red hat inc/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: AMIAMI\n    username: ''\n  - password: AMIDECOD\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Red Hat, Inc - PC BIOS\nport: 0\nvendor: RED HAT, INC\n"
  },
  {
    "path": "totalpass/payloads/cirt/red hat inc/Redhat 6.2.yml",
    "content": "auth:\n  credentials:\n  - password: q\n    username: piranha\n  - password: piranha\n    username: piranha\ncategory: http\ncomment: 'Level: User; '\nname: Red Hat, Inc - Redhat 6.2\nport: 0\nvendor: RED HAT, INC\n"
  },
  {
    "path": "totalpass/payloads/cirt/redcreek communications/Ravlin VPN - snmp.yml",
    "content": "auth:\n  credentials:\n  - password: private\n    username: ''\ncategory: snmp\ncomment: 'Notes: SNMP read/write string is \"private\"; '\nname: Redcreek Communications - Ravlin VPN - snmp\nport: 0\nvendor: REDCREEK COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/redcreek communications/Ravlin VPN.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: ''\ncategory: unknown\ncomment: ''\nname: Redcreek Communications - Ravlin VPN\nport: 0\nvendor: REDCREEK COMMUNICATIONS\n"
  },
  {
    "path": "totalpass/payloads/cirt/remedy/Remedy.yml",
    "content": "auth:\n  credentials:\n  - password: AR#Admin#\n    username: ARAdmin\n  - password: ''\n    username: Demo\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Remedy - Remedy\nport: 0\nvendor: REMEDY\n"
  },
  {
    "path": "totalpass/payloads/cirt/remote-exploit/BackTrack.yml",
    "content": "auth:\n  credentials:\n  - password: toor\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: remote-exploit - BackTrack\nport: 0\nvendor: REMOTE-EXPLOIT\n"
  },
  {
    "path": "totalpass/payloads/cirt/research/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Col2ogro2\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Research - PC BIOS\nport: 0\nvendor: RESEARCH\n"
  },
  {
    "path": "totalpass/payloads/cirt/research machines/Classroom Assistant.yml",
    "content": "auth:\n  credentials:\n  - password: changeme\n    username: manager\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Research Machines - Classroom Assistant\nport: 0\nvendor: RESEARCH MACHINES\n"
  },
  {
    "path": "totalpass/payloads/cirt/resumix/Resumix.yml",
    "content": "auth:\n  credentials:\n  - password: resumix\n    username: root\ncategory: unknown\ncomment: ''\nname: Resumix - Resumix\nport: 0\nvendor: RESUMIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/ricoh/Aficio 2045e.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Ricoh - Aficio 2045e\nport: 0\nvendor: RICOH\n"
  },
  {
    "path": "totalpass/payloads/cirt/ricoh/Aficio MP printers.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: multiple\ncomment: ''\nname: Ricoh - Aficio MP printers\nport: 0\nvendor: RICOH\n"
  },
  {
    "path": "totalpass/payloads/cirt/ricoh/Aficio.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Version: 3035, 3228, 2075; Level: Administrator; '\nname: Ricoh - Aficio\nport: 0\nvendor: RICOH\n"
  },
  {
    "path": "totalpass/payloads/cirt/ricoh/Afico 3025.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Ricoh - Afico 3025\nport: 0\nvendor: RICOH\n"
  },
  {
    "path": "totalpass/payloads/cirt/ricoh/MP 2550 printer.yml",
    "content": "auth:\n  credentials:\n  - password: no password\n    username: admin\ncategory: unknown\ncomment: ''\nname: Ricoh - MP 2550 printer\nport: 0\nvendor: RICOH\n"
  },
  {
    "path": "totalpass/payloads/cirt/ricoh/NRG DSm645.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Ricoh - NRG DSm645\nport: 0\nvendor: RICOH\n"
  },
  {
    "path": "totalpass/payloads/cirt/rizen/WebGUI.yml",
    "content": "auth:\n  credentials:\n  - password: 123qwe\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://freshmeat.net/projects/webgui/; '\nname: Rizen - WebGUI\nport: 0\nvendor: RIZEN\n"
  },
  {
    "path": "totalpass/payloads/cirt/rm/RM Connect.yml",
    "content": "auth:\n  credentials:\n  - password: rmnetlm\n    username: admin\n  - password: changeme\n    username: admin2\n  - password: changeme\n    username: adminstrator\n  - password: password\n    username: deskalt\n  - password: changeme\n    username: deskman\n  - password: password\n    username: desknorm\n  - password: password\n    username: deskres\n  - password: ''\n    username: guest\n  - password: replicator\n    username: replicator\n  - password: password\n    username: RMUser1\n  - password: changeme\n    username: setup\n  - password: password\n    username: teacher\n  - password: password\n    username: temp1\n  - password: password\n    username: topicalt\n  - password: password\n    username: topicnorm\n  - password: password\n    username: topicres\ncategory: multi\ncomment: ''\nname: RM - RM Connect\nport: 0\nvendor: RM\n"
  },
  {
    "path": "totalpass/payloads/cirt/rm/Server BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: RM\n    username: ''\ncategory: console\ncomment: ''\nname: RM - Server BIOS\nport: 0\nvendor: RM\n"
  },
  {
    "path": "totalpass/payloads/cirt/rnn/RNN's Guestbook.yml",
    "content": "auth:\n  credentials:\n  - password: demo\n    username: admin\ncategory: http\ncomment: 'Version: 1.2; Level: Administrator; Notes: Stored in plaintext in the gbpass.pl\n  file.; '\nname: RNN - RNN's Guestbook\nport: 0\nvendor: RNN\n"
  },
  {
    "path": "totalpass/payloads/cirt/rodopi/Unknown.yml",
    "content": "auth:\n  credentials:\n  - password: Rodopi\n    username: Rodopi\ncategory: unknown\ncomment: ''\nname: Rodopi - Unknown\nport: 0\nvendor: RODOPI\n"
  },
  {
    "path": "totalpass/payloads/cirt/rpath/rPath.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: rPath - rPath\nport: 0\nvendor: RPATH\n"
  },
  {
    "path": "totalpass/payloads/cirt/rsa/Access Manager.yml",
    "content": "auth:\n  credentials:\n  - password: admin1234\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: https://twitter.com/#!/hdmoore/statuses/79034896244408320; '\nname: RSA - Access Manager\nport: 0\nvendor: RSA\n"
  },
  {
    "path": "totalpass/payloads/cirt/rsa/Cleartrust.yml",
    "content": "auth:\n  credentials:\n  - password: admin1234\n    username: admin\ncategory: http\ncomment: ''\nname: RSA - Cleartrust\nport: 0\nvendor: RSA\n"
  },
  {
    "path": "totalpass/payloads/cirt/rsa/Network Intelligence.yml",
    "content": "auth:\n  credentials:\n  - password: themaster01\n    username: master\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: RSA - Network Intelligence\nport: 0\nvendor: RSA\n"
  },
  {
    "path": "totalpass/payloads/cirt/rsa/SecurID Appliance.yml",
    "content": "auth:\n  credentials:\n  - password: RSAAppliance\n    username: administrator\ncategory: http\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.100.100 Default port: 8098; '\nname: RSA - SecurID Appliance\nport: 0\nvendor: RSA\n"
  },
  {
    "path": "totalpass/payloads/cirt/saba/Centra.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 7; Level: Administrator; '\nname: Saba - Centra\nport: 0\nvendor: SABA\n"
  },
  {
    "path": "totalpass/payloads/cirt/safecom/Router.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Safecom - Router\nport: 0\nvendor: SAFECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/samba/SWAT.yml",
    "content": "auth:\n  credentials:\n  - password: Any\n    username: Any\ncategory: http\ncomment: 'Notes: Log in with any valid system user account/password.; '\nname: Samba - SWAT\nport: 0\nvendor: SAMBA\n"
  },
  {
    "path": "totalpass/payloads/cirt/sambar technologies/Sambar Server.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\n  - password: ''\n    username: billy-bob\n  - password: guest\n    username: guest\n  - password: ''\n    username: anonymous\n  - password: ''\n    username: ftp\ncategory: http\ncomment: 'Level: Administrator; '\nname: Sambar Technologies - Sambar Server\nport: 0\nvendor: SAMBAR TECHNOLOGIES\n"
  },
  {
    "path": "totalpass/payloads/cirt/samsung/Printers.yml",
    "content": "auth:\n  credentials:\n  - password: s!a@m#n$p%c\n    username: ''\ncategory: snmp\ncomment: 'Level: Public; Doc: http://l8security.com/post/36715280176/uv-281284-samsung-printer-snmp-backdoor; '\nname: Samsung - Printers\nport: 0\nvendor: SAMSUNG\n"
  },
  {
    "path": "totalpass/payloads/cirt/samuel abels/Ammerum.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: user\ncategory: unknown\ncomment: 'Version: 0.6-1; '\nname: Samuel Abels - Ammerum\nport: 0\nvendor: SAMUEL ABELS\n"
  },
  {
    "path": "totalpass/payloads/cirt/sap/Axis2.yml",
    "content": "auth:\n  credentials:\n  - password: axis2\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: https://spl0it.wordpress.com/2010/11/23/axis2-deployer-metasploit-modules-upload-exec-via-soap/;\n  Notes: dswsbobje, SOAP web service deployer.; '\nname: SAP - Axis2\nport: 0\nvendor: SAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/sap/Business Connector.yml",
    "content": "auth:\n  credentials:\n  - password: manage\n    username: Administrator\n  - password: isdev\n    username: Developer\n  - password: iscopy\n    username: Replicator\ncategory: unknown\ncomment: 'Version: 4.7; Level: Administrator; '\nname: SAP - Business Connector\nport: 0\nvendor: SAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/sap/ITS.yml",
    "content": "auth:\n  credentials:\n  - password: init\n    username: itsadmin\ncategory: unknown\ncomment: ''\nname: SAP - ITS\nport: 0\nvendor: SAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/sap/R-3.yml",
    "content": "auth:\n  credentials:\n  - password: PASS\n    username: SAP*\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: SAP - R/3\nport: 0\nvendor: SAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/sap/SAP Local Database.yml",
    "content": "auth:\n  credentials:\n  - password: SAP\n    username: SAPR3\ncategory: unknown\ncomment: ''\nname: SAP - SAP Local Database\nport: 0\nvendor: SAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/sap/SAP.yml",
    "content": "auth:\n  credentials:\n  - password: 06071992\n    username: SAP*\n  - password: admin\n    username: SAPCPIC\n  - password: '19920706'\n    username: DDIC\n  - password: SUPPORT\n    username: EARLYWATCH\n  - password: ''\n    username: TMSADM\n  - password: 06071992\n    username: SAP*\n  - password: '19920706'\n    username: DDIC\n  - password: admin\n    username: SAPCPIC\n  - password: SUPPORT\n    username: EARLYWATCH\ncategory: unknown\ncomment: 'Version: R/3; '\nname: SAP - SAP\nport: 0\nvendor: SAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/sap/Visual Composer.yml",
    "content": "auth:\n  credentials:\n  - password: sap123\n    username: ctb_admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: SAP - Visual Composer\nport: 0\nvendor: SAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/sap/xMII.yml",
    "content": "auth:\n  credentials:\n  - password: sap123\n    username: xmi_demo\ncategory: unknown\ncomment: ''\nname: SAP - xMII\nport: 0\nvendor: SAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/schneider electric/ETZ 410-510 Module - pap.yml",
    "content": "auth:\n  credentials:\n  - password: USER\n    username: USER\ncategory: pap\ncomment: 'Doc: http://www.global-download.schneider-electric.com/85257849002EB8CB/all/EA0E0F24F9F8C79585257876007D8F88/$File/35004734_k01_000_05.pdf; '\nname: Schneider Electric - ETZ 410/510 Module - pap\nport: 0\nvendor: SCHNEIDER ELECTRIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/schneider electric/ETZ 410-510 Module.yml",
    "content": "auth:\n  credentials:\n  - password: USER\n    username: USER\ncategory: http\ncomment: 'Doc: http://www.global-download.schneider-electric.com/85257849002EB8CB/all/EA0E0F24F9F8C79585257876007D8F88/$File/35004734_k01_000_05.pdf; '\nname: Schneider Electric - ETZ 410/510 Module\nport: 0\nvendor: SCHNEIDER ELECTRIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/schneider electric/FactoryCast Quantum - Premium PLC Management - http.yml",
    "content": "auth:\n  credentials:\n  - password: USER\n    username: USER\ncategory: http\ncomment: ''\nname: Schneider Electric - FactoryCast Quantum / Premium PLC Management - http\nport: 0\nvendor: SCHNEIDER ELECTRIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/schneider electric/FactoryCast Quantum - Premium PLC Management.yml",
    "content": "auth:\n  credentials:\n  - password: USER\n    username: USER\n  - password: ntpupdate\n    username: ntpupdate\ncategory: ftp\ncomment: ''\nname: Schneider Electric - FactoryCast Quantum / Premium PLC Management\nport: 0\nvendor: SCHNEIDER ELECTRIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/schneider electric/PowerLogic Ethernet Communications Card.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; '\nname: Schneider Electric - PowerLogic Ethernet Communications Card\nport: 0\nvendor: SCHNEIDER ELECTRIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/schneider electric/Quantum NOE 771 xx Ethernet Module - http.yml",
    "content": "auth:\n  credentials:\n  - password: USER\n    username: USER\ncategory: http\ncomment: 'Doc: http://www.alamedaelectric.com/Modicon%20Documents/PLC%20Quantum%20PLC%20NOE771xx%20User%20Manual%20v5.0.pdf; '\nname: Schneider Electric - Quantum NOE 771 xx Ethernet Module - http\nport: 0\nvendor: SCHNEIDER ELECTRIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/schneider electric/Quantum NOE 771 xx Ethernet Module.yml",
    "content": "auth:\n  credentials:\n  - password: USER\n    username: USER\ncategory: ftp\ncomment: 'Doc: http://www.alamedaelectric.com/Modicon%20Documents/PLC%20Quantum%20PLC%20NOE771xx%20User%20Manual%20v5.0.pdf; '\nname: Schneider Electric - Quantum NOE 771 xx Ethernet Module\nport: 0\nvendor: SCHNEIDER ELECTRIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/seagull scientific/Track'Em.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ADMIN\n  - password: USER\n    username: USER\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Seagull Scientific - Track'Em\nport: 0\nvendor: SEAGULL SCIENTIFIC\n"
  },
  {
    "path": "totalpass/payloads/cirt/seclore/FileSecure.yml",
    "content": "auth:\n  credentials:\n  - password: changeonfirstlogin\n    username: root\n  - password: changeonfirstlogin\n    username: sa\ncategory: http\ncomment: 'Level: Administrator; '\nname: Seclore - FileSecure\nport: 0\nvendor: SECLORE\n"
  },
  {
    "path": "totalpass/payloads/cirt/securicor3net/Cezanne.yml",
    "content": "auth:\n  credentials:\n  - password: friend\n    username: manager\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Securicor3NET - Cezanne\nport: 0\nvendor: SECURICOR3NET\n"
  },
  {
    "path": "totalpass/payloads/cirt/semaphore/PICK O-S.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: DESQUETOP\n  - password: ''\n    username: DS\n  - password: ''\n    username: DSA\n  - password: ''\n    username: PHANTOM\ncategory: unknown\ncomment: ''\nname: Semaphore - PICK O/S\nport: 0\nvendor: SEMAPHORE\n"
  },
  {
    "path": "totalpass/payloads/cirt/seyeon technology co ltd/FlexWATCH.yml",
    "content": "auth:\n  credentials:\n  - password: root\n    username: root\ncategory: multiple\ncomment: 'Version: 3.0; Level: Administrator; Doc: http://www.flexwatch.com/pro_down/fw_all/M4028%20-%20FlexWATCH%20User%20Manual%20Part2.pdf; '\nname: Seyeon Technology Co., Ltd - FlexWATCH\nport: 0\nvendor: SEYEON TECHNOLOGY CO., LTD\n"
  },
  {
    "path": "totalpass/payloads/cirt/shiva/AccessPort.yml",
    "content": "auth:\n  credentials:\n  - password: hello\n    username: hello\ncategory: unknown\ncomment: ''\nname: Shiva - AccessPort\nport: 0\nvendor: SHIVA\n"
  },
  {
    "path": "totalpass/payloads/cirt/shiva/LanRover.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: root\n  - password: ''\n    username: guest\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Shiva - LanRover\nport: 0\nvendor: SHIVA\n"
  },
  {
    "path": "totalpass/payloads/cirt/shuttle/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Spacve\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Shuttle - PC BIOS\nport: 0\nvendor: SHUTTLE\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens/Gigaset SX762.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: http\ncomment: 'Level: Administrator; '\nname: Siemens - Gigaset SX762\nport: 0\nvendor: SIEMENS\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens/OpenStage SIP Webinterface.yml",
    "content": "auth:\n  credentials:\n  - password: '123456'\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://wiki.unify.com/wiki/OpenStage_SIP_FAQ#What_are_the_default_passwords.3F;\n  Notes: Admin Menu; '\nname: Siemens - OpenStage SIP Webinterface\nport: 0\nvendor: SIEMENS\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens/S7.yml",
    "content": "auth:\n  credentials:\n  - password: basisk\n    username: basisk\ncategory: unknown\ncomment: 'Doc: http://m.itworld.com/data-centerservers/190269/power-plant-hack-anybody-could-use; '\nname: Siemens - S7\nport: 0\nvendor: SIEMENS\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/Hicom 100E PBX.yml",
    "content": "auth:\n  credentials:\n  - password: '31994'\n    username: '31994'\ncategory: unknown\ncomment: ''\nname: Siemens Corp - Hicom 100E PBX\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/Hicom 150E PBX.yml",
    "content": "auth:\n  credentials:\n  - password: '31994'\n    username: '31994'\ncategory: unknown\ncomment: ''\nname: Siemens Corp - Hicom 150E PBX\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/Hipath-Hicom.yml",
    "content": "auth:\n  credentials:\n  - password: '18140815'\n    username: '18140815'\ncategory: unknown\ncomment: ''\nname: Siemens Corp - Hipath/Hicom\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/PBX.yml",
    "content": "auth:\n  credentials:\n  - password: uboot\n    username: ''\ncategory: unknown\ncomment: 'Version: 8818; '\nname: Siemens Corp - PBX\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: SKY_FOX\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Siemens Corp - PC BIOS\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/PhoneMail.yml",
    "content": "auth:\n  credentials:\n  - password: poll\n    username: poll\n  - password: system\n    username: system\n  - password: field\n    username: system\n  - password: tech\n    username: poll\n  - password: sysadmin\n    username: sysadmin\n  - password: tech\n    username: tech\ncategory: unknown\ncomment: ''\nname: Siemens Corp - PhoneMail\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/ROLM PBX.yml",
    "content": "auth:\n  credentials:\n  - password: pwp\n    username: admin\n  - password: engineer\n    username: eng\n  - password: op\n    username: op\n  - password: operator\n    username: op\n  - password: super\n    username: su\ncategory: unknown\ncomment: ''\nname: Siemens Corp - ROLM PBX\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/SE515.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Siemens Corp - SE515\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/siemens corp/Simatic WinCC SCADA.yml",
    "content": "auth:\n  credentials:\n  - password: 2WSXcder\n    username: WinCCConnect\n  - password: 2WSXcde\n    username: WinCCAdmin\ncategory: unknown\ncomment: 'Doc: http://iadt.siemens.ru/forum/viewtopic.php?p=2974&sid=58cedcf3a0fc7a0b6c61c7bc46530928;\n  Notes: http://www.wired.com/threatlevel/2010/07/siemens-scada/; '\nname: Siemens Corp - Simatic WinCC SCADA\nport: 0\nvendor: SIEMENS CORP\n"
  },
  {
    "path": "totalpass/payloads/cirt/sierra wireless/ACEmanager.yml",
    "content": "auth:\n  credentials:\n  - password: '12345'\n    username: user\ncategory: http\ncomment: 'Doc: http://mycusthelp.net/SIERRAWIRELESS/_cs/AnswerDetail.aspx?sSessionID=&aid=468;\n  Notes: Default interface: http://192.168.13.31:9191/; '\nname: Sierra Wireless - ACEmanager\nport: 0\nvendor: SIERRA WIRELESS\n"
  },
  {
    "path": "totalpass/payloads/cirt/silex technology/USB Device Server - http.yml",
    "content": "auth:\n  credentials:\n  - password: (non)\n    username: root\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.silexeurope.com/en/home/support/faq/usb-device-server.html#faq25; '\nname: Silex Technology - USB Device Server - http\nport: 0\nvendor: SILEX TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/silex technology/USB Device Server.yml",
    "content": "auth:\n  credentials:\n  - password: (non)\n    username: root\ncategory: telnet\ncomment: 'Level: Administrator; Doc: http://www.silexeurope.com/en/home/support/faq/usb-device-server.html#faq25; '\nname: Silex Technology - USB Device Server\nport: 0\nvendor: SILEX TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/silicon graphics/IRIX - multi.yml",
    "content": "auth:\n  credentials:\n  - password: tutor\n    username: tutor\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Silicon Graphics - IRIX - multi\nport: 0\nvendor: SILICON GRAPHICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/silicon graphics/IRIX.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: 6.x\n  - password: ''\n    username: 6.x\ncategory: 5.x\ncomment: 'Level: Multi; Notes: lp; '\nname: Silicon Graphics - IRIX\nport: 0\nvendor: SILICON GRAPHICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/site interactive/Auction Weaver Lite.yml",
    "content": "auth:\n  credentials:\n  - password: pass\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Site Interactive - Auction Weaver Lite\nport: 0\nvendor: SITE INTERACTIVE\n"
  },
  {
    "path": "totalpass/payloads/cirt/sitecom/DC-207.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sitecom - DC-207\nport: 0\nvendor: SITECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/sitecom/WL-108.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sitecom - WL-108\nport: 0\nvendor: SITECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/sitecom/WL-109.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sitecom - WL-109\nport: 0\nvendor: SITECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/sitecom/WL-114v2.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sitecom - WL-114v2\nport: 0\nvendor: SITECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/sitecom/WL-122.yml",
    "content": "auth:\n  credentials:\n  - password: sitecom\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sitecom - WL-122\nport: 0\nvendor: SITECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/sitecom/WR-1133.yml",
    "content": "auth:\n  credentials:\n  - password: damin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sitecom - WR-1133\nport: 0\nvendor: SITECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/sitecore corporation/Sitecore CMS.yml",
    "content": "auth:\n  credentials:\n  - password: b\n    username: admin\n  - password: a\n    username: Audrey\n  - password: b\n    username: Bill\n  - password: d\n    username: Denny\n  - password: l\n    username: Lonnie\n  - password: m\n    username: Minnie\ncategory: http\ncomment: 'Level: Administrator; Doc: http://sdn.sitecore.net/upload/sdn5/tools/v53_to_v6/sitecore_cms_53_to_cms_6_database_conversion_tool-a4.pdf; '\nname: Sitecore Corporation - Sitecore CMS\nport: 0\nvendor: SITECORE CORPORATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/skybox security/Virtual Appliance - console.yml",
    "content": "auth:\n  credentials:\n  - password: skyboxview\n    username: root\ncategory: console\ncomment: 'Version: 8.0.300; Level: Administrator; Doc: http://downloads.skyboxsecurity.com/files/iso/Archive/8.0.306-7.1.28-2.5-1.0.0.3/Quick_Start_Guide/SkyboxVirtual_Appliance_QuickStartGuide.pdf;\n  Notes: HTTP port 444; '\nname: Skybox Security - Virtual Appliance - console\nport: 0\nvendor: SKYBOX SECURITY\n"
  },
  {
    "path": "totalpass/payloads/cirt/skybox security/Virtual Appliance.yml",
    "content": "auth:\n  credentials:\n  - password: skyboxview\n    username: root\ncategory: http\ncomment: 'Version: 8.0.300; Level: Administrator; Doc: http://downloads.skyboxsecurity.com/files/iso/Archive/8.0.306-7.1.28-2.5-1.0.0.3/Quick_Start_Guide/SkyboxVirtual_Appliance_QuickStartGuide.pdf;\n  Notes: HTTP port 444; '\nname: Skybox Security - Virtual Appliance\nport: 0\nvendor: SKYBOX SECURITY\n"
  },
  {
    "path": "totalpass/payloads/cirt/sma america/Sunny Webbox.yml",
    "content": "auth:\n  credentials:\n  - password: sma\n    username: ''\ncategory: unknown\ncomment: 'Level: Installer; Doc: http://files.sma.de/dl/4253/SWebBox-BUS-eng-111033.pdf; '\nname: SMA America - Sunny Webbox\nport: 0\nvendor: SMA AMERICA\n"
  },
  {
    "path": "totalpass/payloads/cirt/smc/Barricade Router (wireless).yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: unknown\ncomment: 'Version: 7004VWBR; Level: Administrator; Notes: To reset power press reset\n  button on back panel. To reset password and defaults, press and hold reset button\n  for at least five seconds -- all front pannel LEDs will come on when unit is reset.\n  Default router IP address is \"192.168.2.1\" or \"192.168.2.1:88\" There is no field\n  for User ID, leave the password field blank and select the \"LOGIN\" button.; '\nname: SMC - Barricade Router (wireless)\nport: 0\nvendor: SMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/smc/Barricade Router.yml",
    "content": "auth:\n  credentials:\n  - password: Barricade\n    username: Admin\n  - password: '0000'\n    username: ''\n  - password: smcadmin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: SMC - Barricade Router\nport: 0\nvendor: SMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/smc/SMC2652W.yml",
    "content": "auth:\n  credentials:\n  - password: WLAN_AP\n    username: default\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: SMC - SMC2652W\nport: 0\nvendor: SMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/smc/SMC2804WBR.yml",
    "content": "auth:\n  credentials:\n  - password: smcadmin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: SMC - SMC2804WBR\nport: 0\nvendor: SMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/smc/SMC7904WBRA.yml",
    "content": "auth:\n  credentials:\n  - password: smcadmin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: SMC - SMC7904WBRA\nport: 0\nvendor: SMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/snap appliance/Snap Appliance.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: https\ncomment: ''\nname: Snap Appliance - Snap Appliance\nport: 0\nvendor: SNAP APPLIANCE\n"
  },
  {
    "path": "totalpass/payloads/cirt/snom/320-360 VoIP Business Phone.yml",
    "content": "auth:\n  credentials:\n  - password: '0000'\n    username: Administrator\ncategory: http\ncomment: ''\nname: Snom - 320/360 VoIP Business Phone\nport: 0\nvendor: SNOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/software ag/webMethods.yml",
    "content": "auth:\n  credentials:\n  - password: manage\n    username: Administrator\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Software AG - webMethods\nport: 0\nvendor: SOFTWARE AG\n"
  },
  {
    "path": "totalpass/payloads/cirt/solarwinds/Serv-U.yml",
    "content": "auth:\n  credentials:\n  - password: '#l@$ak#.lk;0@P'\n    username: LocalAdministrator\ncategory: multiple\ncomment: 'Version: <6.0.0.1; Level: Administrator; Doc: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2532; '\nname: SolarWinds - Serv-U\nport: 0\nvendor: SOLARWINDS\n"
  },
  {
    "path": "totalpass/payloads/cirt/solarwinds/Web Help Desk.yml",
    "content": "auth:\n  credentials:\n  - password: whd\n    username: whd\ncategory: unknown\ncomment: 'Level: PostgreSQL; Doc: http://www.solarwinds.com/documentation/WebHelpDesk/docs/WHDAdminGuide.pdf; '\nname: SolarWinds - Web Help Desk\nport: 0\nvendor: SOLARWINDS\n"
  },
  {
    "path": "totalpass/payloads/cirt/sonicwall/SOHO, TELE, TZ and PRO.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sonicwall - SOHO, TELE, TZ and PRO\nport: 0\nvendor: SONICWALL\n"
  },
  {
    "path": "totalpass/payloads/cirt/sony/SNC-RZ30 Network Camera.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.networkcamerareviews.com/forums/about3458.html; '\nname: Sony - SNC-RZ30 Network Camera\nport: 0\nvendor: SONY\n"
  },
  {
    "path": "totalpass/payloads/cirt/sony ericsson/T290i, T68i.yml",
    "content": "auth:\n  credentials:\n  - password: '0000'\n    username: ''\ncategory: unknown\ncomment: 'Notes: This is the default password for resetting the phone and some other\n  password-protected operations.; '\nname: Sony Ericsson - T290i, T68i\nport: 0\nvendor: SONY ERICSSON\n"
  },
  {
    "path": "totalpass/payloads/cirt/sourcefire/RNA Sensor - console.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: root\ncategory: console\ncomment: 'Level: Administrator; '\nname: Sourcefire - RNA Sensor - console\nport: 0\nvendor: SOURCEFIRE\n"
  },
  {
    "path": "totalpass/payloads/cirt/sourcefire/RNA Sensor - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: root\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Sourcefire - RNA Sensor - ssh\nport: 0\nvendor: SOURCEFIRE\n"
  },
  {
    "path": "totalpass/payloads/cirt/sourcefire/RNA Sensor.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Sourcefire - RNA Sensor\nport: 0\nvendor: SOURCEFIRE\n"
  },
  {
    "path": "totalpass/payloads/cirt/sovereign hill/InQuery.yml",
    "content": "auth:\n  credentials:\n  - password: shs\n    username: Admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sovereign Hill - InQuery\nport: 0\nvendor: SOVEREIGN HILL\n"
  },
  {
    "path": "totalpass/payloads/cirt/spider systems/M250.yml",
    "content": "auth:\n  credentials:\n  - password: hello\n    username: (blank)\ncategory: unknown\ncomment: ''\nname: Spider Systems - M250\nport: 0\nvendor: SPIDER SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/splunk/Splunk.yml",
    "content": "auth:\n  credentials:\n  - password: changeme\n    username: admin\ncategory: http\ncomment: 'Level: administrator; '\nname: Splunk - Splunk\nport: 0\nvendor: SPLUNK\n"
  },
  {
    "path": "totalpass/payloads/cirt/ssangyoung/SR2501.yml",
    "content": "auth:\n  credentials:\n  - password: '2501'\n    username: (blank)\ncategory: unknown\ncomment: ''\nname: Ssangyoung - SR2501\nport: 0\nvendor: SSANGYOUNG\n"
  },
  {
    "path": "totalpass/payloads/cirt/stan ozier/TaskFreak.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Version: 0.6.4; Level: Administrator; Doc: http://taskfreak.com/; '\nname: Stan Ozier - TaskFreak\nport: 0\nvendor: STAN OZIER\n"
  },
  {
    "path": "totalpass/payloads/cirt/sun/JavaServer.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sun - JavaServer\nport: 0\nvendor: SUN\n"
  },
  {
    "path": "totalpass/payloads/cirt/sun/SPARC Enterprise X5220 Server.yml",
    "content": "auth:\n  credentials:\n  - password: changeme\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sun - SPARC Enterprise X5220 Server\nport: 0\nvendor: SUN\n"
  },
  {
    "path": "totalpass/payloads/cirt/sun/Sun E10000 System Service Processor.yml",
    "content": "auth:\n  credentials:\n  - password: ssp\n    username: ssp\ncategory: multi\ncomment: 'Level: Administrator; '\nname: Sun - Sun E10000 System Service Processor\nport: 0\nvendor: SUN\n"
  },
  {
    "path": "totalpass/payloads/cirt/sun/SunOS.yml",
    "content": "auth:\n  credentials:\n  - password: t00lk1t\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default root password set by the Solaris Security\n  Toolkit (JASS) v0.3 toolkit upon execution of the default hardening scripts.; '\nname: Sun - SunOS\nport: 0\nvendor: SUN\n"
  },
  {
    "path": "totalpass/payloads/cirt/sun/SunScreen.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: tcp 3852\ncomment: 'Version: 3.1 Lite; Level: Administrator; Notes: Use a Java enabled web browser\n  on port 3852; '\nname: Sun - SunScreen\nport: 0\nvendor: SUN\n"
  },
  {
    "path": "totalpass/payloads/cirt/sun/X4200 iloms.yml",
    "content": "auth:\n  credentials:\n  - password: changeme\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Sun - X4200 iloms\nport: 0\nvendor: SUN\n"
  },
  {
    "path": "totalpass/payloads/cirt/super micro computer inc/IPMI.yml",
    "content": "auth:\n  credentials:\n  - password: ADMIN\n    username: ADMIN\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.supermicro.com/manuals/other/Onboard_BMC_IPMI.pdf;\n  Notes: Also known as Supermicro.; '\nname: Super Micro Computer, Inc. - IPMI\nport: 0\nvendor: SUPER MICRO COMPUTER, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/supermicro/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: ksdjfg934t\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: SuperMicro - PC BIOS\nport: 0\nvendor: SUPERMICRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/surecom/Unknown.yml",
    "content": "auth:\n  credentials:\n  - password: surecom\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Surecom - Unknown\nport: 0\nvendor: SURECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/surecom/Wireless Broadband Router 11Mbps.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Surecom - Wireless Broadband Router 11Mbps\nport: 0\nvendor: SURECOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/CC300010.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 10.0.0.2; '\nname: Sweex - CC300010\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/CC300011.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 10.0.0.2; '\nname: Sweex - CC300011\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/CC400010.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 10.0.0.2; '\nname: Sweex - CC400010\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/CC400020.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 10.0.0.2; '\nname: Sweex - CC400020\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/CD300010.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 10.0.0.2; '\nname: Sweex - CD300010\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/CD300011.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 10.0.0.2; '\nname: Sweex - CD300011\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/CD400011.yml",
    "content": "auth:\n  credentials:\n  - password: epicrouter\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 10.0.0.2; '\nname: Sweex - CD400011\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LB000020.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.1; '\nname: Sweex - LB000020\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LB000021.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.1; '\nname: Sweex - LB000021\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LB200010.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.1; '\nname: Sweex - LB200010\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LB300010.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.1; '\nname: Sweex - LB300010\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LC000070.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.123.254; '\nname: Sweex - LC000070\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LW050.yml",
    "content": "auth:\n  credentials:\n  - password: mysweex\n    username: sweex\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.50.1; '\nname: Sweex - LW050\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LW055.yml",
    "content": "auth:\n  credentials:\n  - password: mysweex\n    username: sweex\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.50.1; '\nname: Sweex - LW055\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LW140.yml",
    "content": "auth:\n  credentials:\n  - password: mysweex\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.0.200; '\nname: Sweex - LW140\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/LW300.yml",
    "content": "auth:\n  credentials:\n  - password: mysweex\n    username: sweex\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.3.1; '\nname: Sweex - LW300\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/MO200.yml",
    "content": "auth:\n  credentials:\n  - password: mysweex\n    username: sweex\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.169.200.1; '\nname: Sweex - MO200\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/MO201.yml",
    "content": "auth:\n  credentials:\n  - password: mysweex\n    username: sweex\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.169.200.1; '\nname: Sweex - MO201\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/MO250.yml",
    "content": "auth:\n  credentials:\n  - password: mysweex\n    username: sweex\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.250.1; '\nname: Sweex - MO250\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/MO251.yml",
    "content": "auth:\n  credentials:\n  - password: mysweex\n    username: sweex\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.251.1; '\nname: Sweex - MO251\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/PR001.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.2; '\nname: Sweex - PR001\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/PR010.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.2; '\nname: Sweex - PR010\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/PR101.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.2; '\nname: Sweex - PR101\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/PR110.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: Default IP: 192.168.2.2; '\nname: Sweex - PR110\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sweex/RO002.yml",
    "content": "auth:\n  credentials:\n  - password: rdc123\n    username: rdc123\ncategory: http\ncomment: 'Level: Administrator; '\nname: Sweex - RO002\nport: 0\nvendor: SWEEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/sybase/ASA.yml",
    "content": "auth:\n  credentials:\n  - password: SQL\n    username: DBA\ncategory: sql\ncomment: 'Level: Administrator; '\nname: Sybase - ASA\nport: 0\nvendor: SYBASE\n"
  },
  {
    "path": "totalpass/payloads/cirt/sybase/Adaptive Server Enterprise.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: 12.x\ncategory: 11.x\ncomment: 'Level: Multi; Notes: sa; '\nname: Sybase - Adaptive Server Enterprise\nport: 0\nvendor: SYBASE\n"
  },
  {
    "path": "totalpass/payloads/cirt/symantec/Brightmail Anti-Spam.yml",
    "content": "auth:\n  credentials:\n  - password: brightmail\n    username: root\ncategory: unknown\ncomment: 'Notes: This is the MySQL account''s password.; '\nname: Symantec - Brightmail Anti-Spam\nport: 0\nvendor: SYMANTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/symantec/Norton Antivurs.yml",
    "content": "auth:\n  credentials:\n  - password: symantec\n    username: ''\ncategory: multiple\ncomment: 'Version: Corporate Edition; Level: Administrator; '\nname: Symantec - Norton Antivurs\nport: 0\nvendor: SYMANTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/symantec/VPN-Firewall Appliance - gui.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: gui\ncomment: 'Version: 100/200; Level: Administrator; Notes: default IP is 192.168.0.1; '\nname: Symantec - VPN/Firewall Appliance - gui\nport: 0\nvendor: SYMANTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/symantec/VPN-Firewall Appliance.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Version: 100/200; Level: Administrator; Notes: default IP is 192.168.0.1; '\nname: Symantec - VPN/Firewall Appliance\nport: 0\nvendor: SYMANTEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/symbol technologies inc/WS5100.yml",
    "content": "auth:\n  credentials:\n  - password: superuser\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Symbol Technologies, Inc - WS5100\nport: 0\nvendor: SYMBOL TECHNOLOGIES, INC\n"
  },
  {
    "path": "totalpass/payloads/cirt/synology inc/DSM Server.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://forum.synology.com/wiki/index.php/Quick_Install_Guide:_Installing_the_Synology_Server; '\nname: Synology Inc - DSM Server\nport: 0\nvendor: SYNOLOGY INC\n"
  },
  {
    "path": "totalpass/payloads/cirt/syskonnect/6616.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: default.password\ncategory: unknown\ncomment: ''\nname: SysKonnect - 6616\nport: 0\nvendor: SYSKONNECT\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Border Controller - http.yml",
    "content": "auth:\n  credentials:\n  - password: TANDBERG\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Tandberg - Border Controller - http\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Border Controller - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: TANDBERG\n    username: admin\ncategory: ssh\ncomment: 'Level: Administrator; '\nname: Tandberg - Border Controller - ssh\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Border Controller.yml",
    "content": "auth:\n  credentials:\n  - password: TANDBERG\n    username: admin\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Tandberg - Border Controller\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Codec - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: ssh\ncomment: ''\nname: Tandberg - Codec - ssh\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Codec - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: telnet\ncomment: ''\nname: Tandberg - Codec - telnet\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Codec.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: ''\nname: Tandberg - Codec\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Gatekeeper.yml",
    "content": "auth:\n  credentials:\n  - password: TANDBERG\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Tandberg - Gatekeeper\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Video Communication Server.yml",
    "content": "auth:\n  credentials:\n  - password: TANDBERG\n    username: root\ncategory: ssh\ncomment: 'Version: 5.0; Level: administrator; '\nname: Tandberg - Video Communication Server\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tandberg/Vision.yml",
    "content": "auth:\n  credentials:\n  - password: GWrv\n    username: ''\ncategory: unknown\ncomment: 'Version: 5000/2500/2000/800; Level: Administrator; '\nname: Tandberg - Vision\nport: 0\nvendor: TANDBERG\n"
  },
  {
    "path": "totalpass/payloads/cirt/tasman/T1.yml",
    "content": "auth:\n  credentials:\n  - password: Tasmannet\n    username: Tasman\ncategory: console\ncomment: 'Version: 1000, 4000, 6000, and 7000 Series Systems; Level: Administrator; '\nname: Tasman - T1\nport: 0\nvendor: TASMAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/tegile/Zebi Array.yml",
    "content": "auth:\n  credentials:\n  - password: tegile\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: https://40centcoffee.wordpress.com/2014/09/17/register-vcenter-server-on-tegile/; '\nname: Tegile - Zebi Array\nport: 0\nvendor: TEGILE\n"
  },
  {
    "path": "totalpass/payloads/cirt/telappliant/IP2006 SIP Phone.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Telappliant - IP2006 SIP Phone\nport: 0\nvendor: TELAPPLIANT\n"
  },
  {
    "path": "totalpass/payloads/cirt/telebit/Netblazer.yml",
    "content": "auth:\n  credentials:\n  - password: nopasswd\n    username: snmp\n  - password: setup\n    username: setup\ncategory: unknown\ncomment: ''\nname: Telebit - Netblazer\nport: 0\nvendor: TELEBIT\n"
  },
  {
    "path": "totalpass/payloads/cirt/telelec/Eagle.yml",
    "content": "auth:\n  credentials:\n  - password: eagle\n    username: eagle\ncategory: unknown\ncomment: ''\nname: Telelec - Eagle\nport: 0\nvendor: TELELEC\n"
  },
  {
    "path": "totalpass/payloads/cirt/teletronics/WL-CPE Router.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www.teletronics.com/CPR_UM_V216.pdf; '\nname: Teletronics - WL-CPE Router\nport: 0\nvendor: TELETRONICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/telewell/TW-EA200.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Telewell - TW-EA200\nport: 0\nvendor: TELEWELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/telewell/TW-EA510.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Notes: http://192.168.0.254/; '\nname: Telewell - TW-EA510\nport: 0\nvendor: TELEWELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/telus/Telephony Services.yml",
    "content": "auth:\n  credentials:\n  - password: telus00\n    username: (created)\n  - password: telus99\n    username: (created)\ncategory: multi\ncomment: 'Level: User; Notes: year 2000 passwords; '\nname: Telus - Telephony Services\nport: 0\nvendor: TELUS\n"
  },
  {
    "path": "totalpass/payloads/cirt/terayon/TeraLink.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Terayon - TeraLink\nport: 0\nvendor: TERAYON\n"
  },
  {
    "path": "totalpass/payloads/cirt/test/test.yml",
    "content": "auth:\n  credentials:\n  - password: test\n    username: test\ncategory: unknown\ncomment: ''\nname: test - test\nport: 0\nvendor: TEST\n"
  },
  {
    "path": "totalpass/payloads/cirt/texbox/TexBox.yml",
    "content": "auth:\n  credentials:\n  - password: '123'\n    username: ''\ncategory: http\ncomment: 'Notes: URL for manager is http://host/cc; '\nname: TexBox - TexBox\nport: 0\nvendor: TEXBOX\n"
  },
  {
    "path": "totalpass/payloads/cirt/textportal/TextPortal.yml",
    "content": "auth:\n  credentials:\n  - password: '12345'\n    username: god1\n  - password: '12345'\n    username: god2\ncategory: unknown\ncomment: ''\nname: TextPortal - TextPortal\nport: 0\nvendor: TEXTPORTAL\n"
  },
  {
    "path": "totalpass/payloads/cirt/thecus tech/N5200.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.google.com/url?sa=t&source=web&cd=77&ved=0CC4QFjAGOEY&url=http%3A%2F%2Fwww.thecus.com%2Fdownload%2Fother%2FN5200_FAQ_2006-11-22.pdf&ei=ayJcTKXXEMOC8gb1qImLAg&usg=AFQjCNE0RnP34sEcHyg382gRoxnnKcNRKw;\n  Notes: Default WAN IP: 192.168.1.100 Default LAN IP: 192.168.2.100 or 192.168.2.254; '\nname: Thecus Tech - N5200\nport: 0\nvendor: THECUS TECH\n"
  },
  {
    "path": "totalpass/payloads/cirt/tibco/MFT Internet Server.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://docs.tibco.com/pub/managed-file-transfer-internet-server/7.2.0-may-2012/MFT%20IS%20v7.2.0%20Installation%20Guide.pdf;\n  Notes: /admin; '\nname: TIBCO - MFT Internet Server\nport: 0\nvendor: TIBCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/tibco/Slingshot.yml",
    "content": "auth:\n  credentials:\n  - password: changeit\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: https://docs.tibco.com/pub/slingshot/1.9.3/doc/pdf/TIB_slingshot_1.9.3_installation.pdf; '\nname: TIBCO - Slingshot\nport: 0\nvendor: TIBCO\n"
  },
  {
    "path": "totalpass/payloads/cirt/tim schaab/Mad.Thought.yml",
    "content": "auth:\n  credentials:\n  - password: changeit\n    username: theman\ncategory: http\ncomment: 'Version: 2.0.1; Level: Administrator; Doc: http://freshmeat.net/projects/madthought/; '\nname: Tim Schaab - Mad.Thought\nport: 0\nvendor: TIM SCHAAB\n"
  },
  {
    "path": "totalpass/payloads/cirt/timetools/SR Series NTP Server - ftp.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: ftp\ncomment: 'Level: Administrator; Notes: For HTTP, only a password is required.; '\nname: TimeTools - SR Series NTP Server - ftp\nport: 0\nvendor: TIMETOOLS\n"
  },
  {
    "path": "totalpass/payloads/cirt/timetools/SR Series NTP Server - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: telnet\ncomment: 'Level: Administrator; Notes: For HTTP, only a password is required.; '\nname: TimeTools - SR Series NTP Server - telnet\nport: 0\nvendor: TIMETOOLS\n"
  },
  {
    "path": "totalpass/payloads/cirt/timetools/SR Series NTP Server.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: For HTTP, only a password is required.; '\nname: TimeTools - SR Series NTP Server\nport: 0\nvendor: TIMETOOLS\n"
  },
  {
    "path": "totalpass/payloads/cirt/tiny/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Tiny\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Tiny - PC BIOS\nport: 0\nvendor: TINY\n"
  },
  {
    "path": "totalpass/payloads/cirt/tinys/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: tiny\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Tinys - PC BIOS\nport: 0\nvendor: TINYS\n"
  },
  {
    "path": "totalpass/payloads/cirt/tmc/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: BIGO\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: TMC - PC BIOS\nport: 0\nvendor: TMC\n"
  },
  {
    "path": "totalpass/payloads/cirt/toplayer/AppSwitch.yml",
    "content": "auth:\n  credentials:\n  - password: toplayer\n    username: siteadmin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: TopLayer - AppSwitch\nport: 0\nvendor: TOPLAYER\n"
  },
  {
    "path": "totalpass/payloads/cirt/toshiba/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: 24Banc81\n    username: ''\n  - password: Toshiba\n    username: ''\n  - password: toshy99\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Toshiba - PC BIOS\nport: 0\nvendor: TOSHIBA\n"
  },
  {
    "path": "totalpass/payloads/cirt/toshiba/WBG.yml",
    "content": "auth:\n  credentials:\n  - password: superpass\n    username: super\ncategory: unknown\ncomment: ''\nname: Toshiba - WBG\nport: 0\nvendor: TOSHIBA\n"
  },
  {
    "path": "totalpass/payloads/cirt/toshiba/e-Studio.yml",
    "content": "auth:\n  credentials:\n  - password: '123456'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Toshiba - e-Studio\nport: 0\nvendor: TOSHIBA\n"
  },
  {
    "path": "totalpass/payloads/cirt/totolink/Soho Routers.yml",
    "content": "auth:\n  credentials:\n  - password: '12345'\n    username: root\n  - password: '12345'\n    username: onlime_r\ncategory: unknown\ncomment: 'Doc: https://pierrekim.github.io/advisories/2015-totolink-0x03.txt; Notes:\n  G150R-V1 G300R-V1 N150RH-V1 N301RT-V1; '\nname: TOTOLINK - Soho Routers\nport: 0\nvendor: TOTOLINK\n"
  },
  {
    "path": "totalpass/payloads/cirt/trend micro/InterScan VirusWall.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: Admin interface is at /interscan/; '\nname: Trend Micro - InterScan VirusWall\nport: 0\nvendor: TREND MICRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/trend micro/Interscan Messaging Security Appliance.yml",
    "content": "auth:\n  credentials:\n  - password: imsa7.0\n    username: admin\ncategory: unknown\ncomment: 'Version: 7; Level: Administrator; Doc: http://www.trendmicro.com/ftp/documentation/guides/IMSA-QSG.pdf; '\nname: Trend Micro - Interscan Messaging Security Appliance\nport: 0\nvendor: TREND MICRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/trend micro/Trend Micro.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Trend Micro - Trend Micro\nport: 0\nvendor: TREND MICRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/trend micro/Trenmicro InterScan Messaging Security Appliance (IMSA) 5000 - serial console.yml",
    "content": "auth:\n  credentials:\n  - password: trendimsa1.0\n    username: root\ncategory: serial console\ncomment: 'Version: 1.0; Level: Administrator; Notes: Webconsole URL: http://[IP address]:8081/IMSS.html\n  Webconsole URL: https://[IP Address]:8445/IMSS.html Default IP: 192.168.252.1/24; '\nname: Trend Micro - Trenmicro InterScan Messaging Security Appliance (IMSA) 5000 -\n  serial console\nport: 0\nvendor: TREND MICRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/trend micro/Trenmicro InterScan Messaging Security Appliance (IMSA) 5000 - ssh.yml",
    "content": "auth:\n  credentials:\n  - password: trendimsa1.0\n    username: root\ncategory: ssh\ncomment: 'Version: 1.0; Level: Administrator; Notes: Webconsole URL: http://[IP address]:8081/IMSS.html\n  Webconsole URL: https://[IP Address]:8445/IMSS.html Default IP: 192.168.252.1/24; '\nname: Trend Micro - Trenmicro InterScan Messaging Security Appliance (IMSA) 5000 -\n  ssh\nport: 0\nvendor: TREND MICRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/trend micro/Trenmicro InterScan Messaging Security Appliance (IMSA) 5000.yml",
    "content": "auth:\n  credentials:\n  - password: trendimsa1.0\n    username: root\ncategory: http\ncomment: 'Version: 1.0; Level: Administrator; Notes: Webconsole URL: http://[IP address]:8081/IMSS.html\n  Webconsole URL: https://[IP Address]:8445/IMSS.html Default IP: 192.168.252.1/24; '\nname: Trend Micro - Trenmicro InterScan Messaging Security Appliance (IMSA) 5000\nport: 0\nvendor: TREND MICRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/tridium/AX.yml",
    "content": "auth:\n  credentials:\n  - password: niagara\n    username: tridium\ncategory: unknown\ncomment: 'Level: Administrator; Doc: https://www.tridium.com/~/media/tridium/library/documents/niagara%20ax%20hardening%20guide.ashx?la=en; '\nname: Tridium - AX\nport: 0\nvendor: TRIDIUM\n"
  },
  {
    "path": "totalpass/payloads/cirt/tridium/Niagara.yml",
    "content": "auth:\n  credentials:\n  - password: niagara\n    username: (system passphrase)\ncategory: unknown\ncomment: 'Version: 4; Level: Administrator; Doc: https://www.tridium.com/~/media/tridium/library/documents/niagara%204%20hardening%20guide.ashx?la=en; '\nname: Tridium - Niagara\nport: 0\nvendor: TRIDIUM\n"
  },
  {
    "path": "totalpass/payloads/cirt/trintech/eAcquirer.yml",
    "content": "auth:\n  credentials:\n  - password: Trintech\n    username: t3admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Trintech - eAcquirer\nport: 0\nvendor: TRINTECH\n"
  },
  {
    "path": "totalpass/payloads/cirt/triumph-adler/DC 2116.yml",
    "content": "auth:\n  credentials:\n  - password: '0'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Triumph-Adler - DC 2116\nport: 0\nvendor: TRIUMPH-ADLER\n"
  },
  {
    "path": "totalpass/payloads/cirt/tumbleweed/IME.yml",
    "content": "auth:\n  credentials:\n  - password: SECRET123\n    username: Admin\ncategory: https\ncomment: 'Level: Administrator; Notes: Case sensitive.; '\nname: Tumbleweed - IME\nport: 0\nvendor: TUMBLEWEED\n"
  },
  {
    "path": "totalpass/payloads/cirt/typo3/TYPO3 - http.yml",
    "content": "auth:\n  credentials:\n  - password: joh316\n    username: ''\ncategory: http\ncomment: 'Version: 4.2.0; Level: Administrator; Notes: For InstallTool; '\nname: TYPO3 - TYPO3 - http\nport: 0\nvendor: TYPO3\n"
  },
  {
    "path": "totalpass/payloads/cirt/typo3/TYPO3.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: 3.6; Level: Administrator; '\nname: TYPO3 - TYPO3\nport: 0\nvendor: TYPO3\n"
  },
  {
    "path": "totalpass/payloads/cirt/typo3 association/Typo3.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Typo3 Association - Typo3\nport: 0\nvendor: TYPO3 ASSOCIATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/unex/NexIP Routers.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: ''\ncategory: unknown\ncomment: ''\nname: Unex - NexIP Routers\nport: 0\nvendor: UNEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/unidesk/Management Appliance (MA).yml",
    "content": "auth:\n  credentials:\n  - password: Unidesk1\n    username: Administrator\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.unidesk.com/support/learn/2.7.0/administer/manage_appliances/admin_ma_config; '\nname: Unidesk - Management Appliance (MA)\nport: 0\nvendor: UNIDESK\n"
  },
  {
    "path": "totalpass/payloads/cirt/unify/OpenStage SIP Webinterface.yml",
    "content": "auth:\n  credentials:\n  - password: '123456'\n    username: ''\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://wiki.unify.com/wiki/OpenStage_SIP_FAQ#What_are_the_default_passwords.3F;\n  Notes: Admin Menu; '\nname: Unify - OpenStage SIP Webinterface\nport: 0\nvendor: UNIFY\n"
  },
  {
    "path": "totalpass/payloads/cirt/united technologies corporation/Interlogix truVision IP Camera.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.interlogix.com/_/assets/library/1072627A%20TruVision%20IP%20Camera%20Configuration%20Manual.pdf; '\nname: United Technologies Corporation - Interlogix truVision IP Camera\nport: 0\nvendor: UNITED TECHNOLOGIES CORPORATION\n"
  },
  {
    "path": "totalpass/payloads/cirt/unix/Generic.yml",
    "content": "auth:\n  credentials:\n  - password: adm\n    username: adm\n  - password: ''\n    username: adm\n  - password: admin\n    username: admin\n  - password: administrator\n    username: administrator\n  - password: ''\n    username: administrator\n  - password: anon\n    username: anon\n  - password: bbs\n    username: bbs\n  - password: ''\n    username: bbs\n  - password: sys\n    username: bin\n  - password: checkfs\n    username: checkfs\n  - password: checkfsys\n    username: checkfsys\n  - password: checksys\n    username: checksys\n  - password: daemon\n    username: daemon\n  - password: ''\n    username: daemon\n  - password: demo\n    username: demo\n  - password: ''\n    username: demo\n  - password: demos\n    username: demos\n  - password: ''\n    username: demos\n  - password: ''\n    username: dni\n  - password: dni\n    username: dni\n  - password: ''\n    username: fal\n  - password: fal\n    username: fal\n  - password: ''\n    username: fax\n  - password: fax\n    username: fax\n  - password: ''\n    username: ftp\n  - password: ftp\n    username: ftp\n  - password: games\n    username: games\n  - password: ''\n    username: games\n  - password: gopher\n    username: gopher\n  - password: ''\n    username: gropher\n  - password: guest\n    username: guest\n  - password: guestgue\n    username: guest\n  - password: ''\n    username: guest\n  - password: halt\n    username: halt\n  - password: ''\n    username: halt\n  - password: informix\n    username: informix\n  - password: install\n    username: install\n  - password: lp\n    username: lp\n  - password: bin\n    username: lp\n  - password: lineprin\n    username: lp\n  - password: ''\n    username: lp\n  - password: lpadm\n    username: lpadm\n  - password: lpadmin\n    username: lpadmin\n  - password: lynx\n    username: lynx\n  - password: ''\n    username: lynx\n  - password: ''\n    username: mail\n  - password: mail\n    username: mail\n  - password: man\n    username: man\n  - password: ''\n    username: man\n  - password: ''\n    username: me\n  - password: me\n    username: me\n  - password: mountfs\n    username: mountfs\n  - password: mountfsys\n    username: mountfsys\n  - password: mountsys\n    username: mountsys\n  - password: news\n    username: news\n  - password: ''\n    username: news\n  - password: ''\n    username: nobody\n  - password: nobody\n    username: nobody\n  - password: ''\n    username: nuucp\n  - password: operator\n    username: operator\n  - password: ''\n    username: operator\n  - password: ''\n    username: oracle\n  - password: postmast\n    username: postmaster\n  - password: ''\n    username: postmaster\n  - password: powerdown\n    username: powerdown\n  - password: rje\n    username: rje\n  - password: root\n    username: root\n  - password: ''\n    username: root\n  - password: setup\n    username: setup\n  - password: shutdown\n    username: shutdown\n  - password: ''\n    username: shutdown\n  - password: sync\n    username: sync\n  - password: ''\n    username: sync\n  - password: sys\n    username: sys\n  - password: system\n    username: sys\n  - password: bin\n    username: sys\n  - password: sysadm\n    username: sysadm\n  - password: admin\n    username: sysadm\n  - password: sysadmin\n    username: sysadmin\n  - password: sysbin\n    username: sysbin\n  - password: ''\n    username: system_admin\n  - password: system_admin\n    username: system_admin\n  - password: trouble\n    username: trouble\n  - password: umountfs\n    username: umountfs\n  - password: umountfsys\n    username: umountfsys\n  - password: umountsys\n    username: umountsys\n  - password: unix\n    username: unix\n  - password: user\n    username: user\n  - password: uucp\n    username: uucp\n  - password: uucpadm\n    username: uucpadm\n  - password: ''\n    username: web\n  - password: web\n    username: web\n  - password: webmaster\n    username: webmaster\n  - password: ''\n    username: webmaster\n  - password: ''\n    username: www\n  - password: www\n    username: www\ncategory: multi\ncomment: 'Level: Administrator; '\nname: UNIX - Generic\nport: 0\nvendor: UNIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/unix/Unix.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: setup\ncategory: telnet\ncomment: 'Notes: Motorola Default; '\nname: UNIX - UNIX\nport: 0\nvendor: UNIX\n"
  },
  {
    "path": "totalpass/payloads/cirt/unknown/POCSAG Radio Paging.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: ''\ncategory: port 8000\ncomment: 'Version: 2.05; Level: Administrator; '\nname: Unknown - POCSAG Radio Paging\nport: 0\nvendor: UNKNOWN\n"
  },
  {
    "path": "totalpass/payloads/cirt/unknown/System 88.yml",
    "content": "auth:\n  credentials:\n  - password: test\n    username: test\n  - password: operator\n    username: operator\n  - password: overseer\n    username: overseer\ncategory: console\ncomment: 'Level: User; '\nname: Unknown - System 88\nport: 0\nvendor: UNKNOWN\n"
  },
  {
    "path": "totalpass/payloads/cirt/us robotics/TOTALswitch.yml",
    "content": "auth:\n  credentials:\n  - password: amber\n    username: none\ncategory: unknown\ncomment: ''\nname: U.S. Robotics - TOTALswitch\nport: 0\nvendor: U.S. ROBOTICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/us robotics/USR5450.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: U.S. Robotics - USR5450\nport: 0\nvendor: U.S. ROBOTICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/us robotics/USR8054.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: U.S. Robotics - USR8054\nport: 0\nvendor: U.S. ROBOTICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/usrobotics/Wireless ADSL Router.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.usr.com/support/doc-popup-template.asp?url=faqs/networking/wireless-security-07/wireless-security-07.htm&loc=unst;\n  Notes: Default IP: 192.168.1.1; '\nname: USRobotics - Wireless ADSL Router\nport: 0\nvendor: USROBOTICS\n"
  },
  {
    "path": "totalpass/payloads/cirt/ut lexar/PBX Switch.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: lexar\ncategory: unknown\ncomment: 'Level: Maintenance; '\nname: UT Lexar - PBX Switch\nport: 0\nvendor: UT LEXAR\n"
  },
  {
    "path": "totalpass/payloads/cirt/utstarcom/B-NAS, B-RAS.yml",
    "content": "auth:\n  credentials:\n  - password: field\n    username: field\n  - password: '*3noguru'\n    username: guru\n  - password: snmp\n    username: snmp\n  - password: dbase\n    username: dbase\ncategory: unknown\ncomment: 'Version: 1000; '\nname: UTStarcom - B-NAS, B-RAS\nport: 0\nvendor: UTSTARCOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/vbrick systems/Multiple.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: VBrick Systems - Multiple\nport: 0\nvendor: VBRICK SYSTEMS\n"
  },
  {
    "path": "totalpass/payloads/cirt/verifone/Verifone Junior.yml",
    "content": "auth:\n  credentials:\n  - password: '166816'\n    username: ''\ncategory: unknown\ncomment: 'Version: 2.05; '\nname: Verifone - Verifone Junior\nport: 0\nvendor: VERIFONE\n"
  },
  {
    "path": "totalpass/payloads/cirt/veritas/Cluster Server.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Veritas - Cluster Server\nport: 0\nvendor: VERITAS\n"
  },
  {
    "path": "totalpass/payloads/cirt/verity/Ultraseek.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Verity - Ultraseek\nport: 0\nvendor: VERITY\n"
  },
  {
    "path": "totalpass/payloads/cirt/verizon/9100EM.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www22.verizon.com/Support/Residential/Internet/fiosinternet/networking/setup/vz9100em/124043.htm;\n  Notes: The router password may have been changed to the serial number of the router; '\nname: Verizon - 9100EM\nport: 0\nvendor: VERIZON\n"
  },
  {
    "path": "totalpass/payloads/cirt/verizon/9100VM.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www22.verizon.com/support/residential/internet/fiosinternet/networking/setup/vz9100/122200.htm;\n  Notes: The router password may have been changed to the serial number of the router; '\nname: Verizon - 9100VM\nport: 0\nvendor: VERIZON\n"
  },
  {
    "path": "totalpass/payloads/cirt/verizon/MI424WR.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; Doc: http://www22.verizon.com/Support/Residential/Internet/fiosinternet/networking/setup/vzmi424/120428.htm;\n  Notes: The router password may have been changed to the serial number of the router; '\nname: Verizon - MI424WR\nport: 0\nvendor: VERIZON\n"
  },
  {
    "path": "totalpass/payloads/cirt/vertex/VERTEX 1501.yml",
    "content": "auth:\n  credentials:\n  - password: vertex25\n    username: root\ncategory: unknown\ncomment: 'Version: 5.05; Level: Administrator; '\nname: vertex - VERTEX 1501\nport: 0\nvendor: VERTEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/vextrec technology/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Vextrex\n    username: ''\ncategory: console\ncomment: ''\nname: Vextrec Technology - PC BIOS\nport: 0\nvendor: VEXTREC TECHNOLOGY\n"
  },
  {
    "path": "totalpass/payloads/cirt/vienuke/VieBoard.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: unknown\ncomment: 'Version: 2.6; Level: Administrator; '\nname: VieNuke - VieBoard\nport: 0\nvendor: VIENUKE\n"
  },
  {
    "path": "totalpass/payloads/cirt/vina technologies/ConnectReach.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: (blank)\ncategory: unknown\ncomment: ''\nname: Vina Technologies - ConnectReach\nport: 0\nvendor: VINA TECHNOLOGIES\n"
  },
  {
    "path": "totalpass/payloads/cirt/virtual programming/VP-ASP Shopping Cart.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\n  - password: vpasp\n    username: vpasp\ncategory: unknown\ncomment: 'Version: 5.0; Level: Administrator; '\nname: Virtual Programming - VP-ASP Shopping Cart\nport: 0\nvendor: VIRTUAL PROGRAMMING\n"
  },
  {
    "path": "totalpass/payloads/cirt/visa vap/VAP - modem.yml",
    "content": "auth:\n  credentials:\n  - password: QNX\n    username: root\ncategory: modem\ncomment: 'Level: root; '\nname: Visa VAP - VAP - modem\nport: 0\nvendor: VISA VAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/visa vap/VAP.yml",
    "content": "auth:\n  credentials:\n  - password: QNX\n    username: root\ncategory: telnet\ncomment: 'Level: root; '\nname: Visa VAP - VAP\nport: 0\nvendor: VISA VAP\n"
  },
  {
    "path": "totalpass/payloads/cirt/vobis/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: merlin\n    username: ''\ncategory: console\ncomment: ''\nname: Vobis - PC BIOS\nport: 0\nvendor: VOBIS\n"
  },
  {
    "path": "totalpass/payloads/cirt/voicegenie technologies/VoiceGenie.yml",
    "content": "auth:\n  credentials:\n  - password: pw\n    username: pw\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: VoiceGenie Technologies - VoiceGenie\nport: 0\nvendor: VOICEGENIE TECHNOLOGIES\n"
  },
  {
    "path": "totalpass/payloads/cirt/voiceobjects germany/VoiceObjects.yml",
    "content": "auth:\n  credentials:\n  - password: manager\n    username: voadmin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://developers.voiceobjects.com/docs/en/VO9/024-voiceobjectspreferences.htm; '\nname: VoiceObjects Germany - VoiceObjects\nport: 0\nvendor: VOICEOBJECTS GERMANY\n"
  },
  {
    "path": "totalpass/payloads/cirt/vonage/VTA.yml",
    "content": "auth:\n  credentials:\n  - password: user\n    username: user\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Vonage - VTA\nport: 0\nvendor: VONAGE\n"
  },
  {
    "path": "totalpass/payloads/cirt/vpasp/VP-ASP Shopping Cart.yml",
    "content": "auth:\n  credentials:\n  - password: vpasp\n    username: vpasp\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: VPASP - VP-ASP Shopping Cart\nport: 0\nvendor: VPASP\n"
  },
  {
    "path": "totalpass/payloads/cirt/wanco inc/NTCIP Message Sign Software.yml",
    "content": "auth:\n  credentials:\n  - password: Guest\n    username: ''\n  - password: Public\n    username: ''\n  - password: ABCD\n    username: ''\n  - password: NTCIP\n    username: ''\ncategory: unknown\ncomment: 'Version: 2004; Level: Administrator; Doc: http://www.scribd.com/doc/68216572/Wanco-Users-Guide-Ntcip-Message-Sign-Software-Dec-2004;\n  Notes: \"Restricted user\"; '\nname: Wanco, Inc. - NTCIP Message Sign Software\nport: 0\nvendor: WANCO, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/watchguard/FireBox.yml",
    "content": "auth:\n  credentials:\n  - password: wg\n    username: (blank)\ncategory: unknown\ncomment: ''\nname: WatchGuard - FireBox\nport: 0\nvendor: WATCHGUARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/watchguard/Firebox X Edge.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.watchguard.com/help/docs/v70FireboxXEdge_QS.pdf;\n  Notes: https://192.168.111.1/; '\nname: WatchGuard - Firebox X Edge\nport: 0\nvendor: WATCHGUARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/watchguard/XTM.yml",
    "content": "auth:\n  credentials:\n  - password: readwrite\n    username: admin\n  - password: readonly\n    username: status\ncategory: http\ncomment: 'Level: Administrator; Doc: http://www.watchguard.com/help/docs/wsm/xtm_11/en-us/content/en-us/basicadmin/factory_default_about_c.html; '\nname: WatchGuard - XTM\nport: 0\nvendor: WATCHGUARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/web wiz/Forums.yml",
    "content": "auth:\n  credentials:\n  - password: letmein\n    username: Administrator\ncategory: http\ncomment: 'Version: 7.x; Level: Administrator; Doc: http://www.webwizguide.info/web_wiz_forums/default.asp; '\nname: Web Wiz - Forums\nport: 0\nvendor: WEB WIZ\n"
  },
  {
    "path": "totalpass/payloads/cirt/webmin/Webmin.yml",
    "content": "auth:\n  credentials:\n  - password: hp.com\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; Notes: This is for the HP-UX default install of Webmin.; '\nname: Webmin - Webmin\nport: 0\nvendor: WEBMIN\n"
  },
  {
    "path": "totalpass/payloads/cirt/webramp/Unknown.yml",
    "content": "auth:\n  credentials:\n  - password: trancell\n    username: wradmin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Webramp - Unknown\nport: 0\nvendor: WEBRAMP\n"
  },
  {
    "path": "totalpass/payloads/cirt/westell/Router.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Version: 6100, 327w, 2200; Level: Administrator; '\nname: Westell - Router\nport: 0\nvendor: WESTELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/westell/Wirespeed.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\n  - password: sysAdmin\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Westell - Wirespeed\nport: 0\nvendor: WESTELL\n"
  },
  {
    "path": "totalpass/payloads/cirt/wim bervoets/WIMBIOSnbsp BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: Compleri\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Wim Bervoets - WIMBIOSnbsp BIOS\nport: 0\nvendor: WIM BERVOETS\n"
  },
  {
    "path": "totalpass/payloads/cirt/wireless inc/WaveNet.yml",
    "content": "auth:\n  credentials:\n  - password: rootpass\n    username: root\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Wireless, Inc. - WaveNet\nport: 0\nvendor: WIRELESS, INC.\n"
  },
  {
    "path": "totalpass/payloads/cirt/wwwboard/WWWADMIN.PL.yml",
    "content": "auth:\n  credentials:\n  - password: WebBoard\n    username: WebAdmin\ncategory: http\ncomment: 'Level: Administrator; '\nname: WWWBoard - WWWADMIN.PL\nport: 0\nvendor: WWWBOARD\n"
  },
  {
    "path": "totalpass/payloads/cirt/x-micro/WLAN 11b Broadband Router.yml",
    "content": "auth:\n  credentials:\n  - password: super\n    username: super\n  - password: '1502'\n    username: '1502'\ncategory: http\ncomment: 'Level: Administrator; '\nname: X-Micro - WLAN 11b Broadband Router\nport: 0\nvendor: X-MICRO\n"
  },
  {
    "path": "totalpass/payloads/cirt/xavi/X7722r.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Xavi - X7722r\nport: 0\nvendor: XAVI\n"
  },
  {
    "path": "totalpass/payloads/cirt/xerox/DocuColor - integrated keyboard.yml",
    "content": "auth:\n  credentials:\n  - password: '11111'\n    username: ''\ncategory: integrated keyboard\ncomment: 'Version: 1632; Level: Administrator; '\nname: Xerox - DocuColor - integrated keyboard\nport: 0\nvendor: XEROX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xerox/DocuColor.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Version: 1632; Level: Administrator; '\nname: Xerox - DocuColor\nport: 0\nvendor: XEROX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xerox/Document Centre 432.yml",
    "content": "auth:\n  credentials:\n  - password: '22222'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Xerox - Document Centre 432\nport: 0\nvendor: XEROX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xerox/Document Centre.yml",
    "content": "auth:\n  credentials:\n  - password: nsa\n    username: NSA\ncategory: ftp\ncomment: 'Level: Guest; Doc: http://download.support.xerox.com/pub/docs/FlowPort2/userdocs/any-os/en/fp_dc_setup_guide.pdf; '\nname: Xerox - Document Centre\nport: 0\nvendor: XEROX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xerox/WorkCentre Pro.yml",
    "content": "auth:\n  credentials:\n  - password: '1111'\n    username: admin\ncategory: http\ncomment: 'Version: 45; Level: Administrator; '\nname: Xerox - WorkCentre Pro\nport: 0\nvendor: XEROX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xerox/WorkCentre-DocumentCentre.yml",
    "content": "auth:\n  credentials:\n  - password: crash\n    username: savelogs\ncategory: unknown\ncomment: ''\nname: Xerox - WorkCentre/DocumentCentre\nport: 0\nvendor: XEROX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xerox/WorkCentre.yml",
    "content": "auth:\n  credentials:\n  - password: '1111'\n    username: admin\n  - password: x-admin\n    username: admin\ncategory: http\ncomment: 'Version: M20i; Level: Administrator; '\nname: Xerox - WorkCentre\nport: 0\nvendor: XEROX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xinit systems ltd/Openfiler.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: openfiler\ncategory: http\ncomment: 'Level: Administrator; '\nname: Xinit Systems Ltd. - Openfiler\nport: 0\nvendor: XINIT SYSTEMS LTD.\n"
  },
  {
    "path": "totalpass/payloads/cirt/xylan/Omniswitch.yml",
    "content": "auth:\n  credentials:\n  - password: switch\n    username: admin\n  - password: switch\n    username: diag\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Xylan - Omniswitch\nport: 0\nvendor: XYLAN\n"
  },
  {
    "path": "totalpass/payloads/cirt/xyplex/MX-1600.yml",
    "content": "auth:\n  credentials:\n  - password: system\n    username: setpriv\ncategory: unknown\ncomment: ''\nname: Xyplex - MX-1600\nport: 0\nvendor: XYPLEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xyplex/Routers.yml",
    "content": "auth:\n  credentials:\n  - password: access\n    username: ''\n  - password: system\n    username: ''\ncategory: port 7000\ncomment: 'Level: User; '\nname: Xyplex - Routers\nport: 0\nvendor: XYPLEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/xyplex/Terminal Server.yml",
    "content": "auth:\n  credentials:\n  - password: access\n    username: ''\n  - password: system\n    username: ''\ncategory: port 7000\ncomment: 'Level: User; '\nname: Xyplex - Terminal Server\nport: 0\nvendor: XYPLEX\n"
  },
  {
    "path": "totalpass/payloads/cirt/yakumo/Routers.yml",
    "content": "auth:\n  credentials:\n  - password: admin\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Yakumo - Routers\nport: 0\nvendor: YAKUMO\n"
  },
  {
    "path": "totalpass/payloads/cirt/yuxin/IP Phone.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: User\n  - password: '19750407'\n    username: User\ncategory: http\ncomment: 'Version: YWH10/YWH100/YWH200/YWH300; Level: Administrator; '\nname: Yuxin - IP Phone\nport: 0\nvendor: YUXIN\n"
  },
  {
    "path": "totalpass/payloads/cirt/zcomax/XG1021.yml",
    "content": "auth:\n  credentials:\n  - password: password\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Zcomax - XG1021\nport: 0\nvendor: ZCOMAX\n"
  },
  {
    "path": "totalpass/payloads/cirt/zebra technologies/10-100 Print Server.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Zebra Technologies - 10/100 Print Server\nport: 0\nvendor: ZEBRA TECHNOLOGIES\n"
  },
  {
    "path": "totalpass/payloads/cirt/zenith/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: 3098z\n    username: ''\n  - password: Zenith\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: Zenith - PC BIOS\nport: 0\nvendor: ZENITH\n"
  },
  {
    "path": "totalpass/payloads/cirt/zeos/PC BIOS.yml",
    "content": "auth:\n  credentials:\n  - password: zeosx\n    username: ''\ncategory: console\ncomment: 'Level: Administrator; '\nname: ZEOS - PC BIOS\nport: 0\nvendor: ZEOS\n"
  },
  {
    "path": "totalpass/payloads/cirt/zeus/Zeus Admin Server.yml",
    "content": "auth:\n  credentials:\n  - password: ''\n    username: admin\ncategory: http\ncomment: 'Version: 4.1r2; '\nname: Zeus - Zeus Admin Server\nport: 0\nvendor: ZEUS\n"
  },
  {
    "path": "totalpass/payloads/cirt/zoom/ADSL Modem.yml",
    "content": "auth:\n  credentials:\n  - password: zoomadsl\n    username: admin\ncategory: unknown\ncomment: 'Level: Administrator; '\nname: Zoom - ADSL Modem\nport: 0\nvendor: ZOOM\n"
  },
  {
    "path": "totalpass/payloads/cirt/zyxel/Generic Routers.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: ''\ncategory: telnet\ncomment: 'Level: Administrator; '\nname: Zyxel - Generic Routers\nport: 0\nvendor: ZYXEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/zyxel/Prestige - ftp.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: ''\ncategory: ftp\ncomment: 'Version: 660HW; Notes: Default IP 192.168.1.1; '\nname: Zyxel - Prestige - ftp\nport: 0\nvendor: ZYXEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/zyxel/Prestige - telnet.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: ''\ncategory: telnet\ncomment: 'Version: 660HW; Notes: Default IP 192.168.1.1; '\nname: Zyxel - Prestige - telnet\nport: 0\nvendor: ZYXEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/zyxel/Prestige 652HW-31.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: admin\ncategory: http\ncomment: 'Level: Administrator; '\nname: Zyxel - Prestige 652HW-31\nport: 0\nvendor: ZYXEL\n"
  },
  {
    "path": "totalpass/payloads/cirt/zyxel/Prestige.yml",
    "content": "auth:\n  credentials:\n  - password: '1234'\n    username: ''\n  - password: '1234'\n    username: admin\ncategory: http\ncomment: 'Version: 660HW; Notes: Default IP 192.168.1.1; '\nname: Zyxel - Prestige\nport: 0\nvendor: ZYXEL\n"
  },
  {
    "path": "totalpass/payloads/redis/redis.yml",
    "content": "auth:\n  credentials:\n  - username: \n    password: \ncategory: redis\nport: 6379\nvendor: REDIS\nname: REDIS\ncomment: redis test\n"
  },
  {
    "path": "totalpass/payloads/snmp/snmp.yml",
    "content": "auth:\n  credentials:\n  - username:\n    password: public\n  - username:\n    password: private\ncategory: snmp\nport: 161\nvendor: SNMP\nname: SNMP\ncomment: snmp test\n"
  },
  {
    "path": "totalpass/payloads/ssh/ssh.yml",
    "content": "auth:\n  credentials:\n  - username: root\n    password: password\n  - username: root\n    password: root\n  - username: admin\n    password: password\n  - username: admin\n    password: admin\n  - username: test\n    password: test\ncategory: ssh\nport: 22\nvendor: SSH\nname: SSH\ncomment: ssh test\n"
  },
  {
    "path": "totalpass/payloads/telnet/telnet.yml",
    "content": "auth:\n  credentials:\n  - username: root\n    password: \n  - username: root\n    password: root\n  - username: test\n    password: test\n  - username: admin\n    password: password\ncategory: telnet\nport: 23\nvendor: TELNET\nname: TELNET\ncomment: telnet test\n"
  },
  {
    "path": "totalpass/payloads/tiny.csv",
    "content": "admin,admin\nadmin,admin123\nadmin,123456\nadmin,1234\nroot,\nroot,root\nroot,123456\nroot,111111\nroot,admin\nguest,guest\nsa,\n"
  },
  {
    "path": "totalpass/scanner.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    基本扫描器类\n\"\"\"\n\nimport sys\nimport click\nimport logging\nimport socket\nfrom .settings import opts\nfrom .exceptions import InvalidCredential\n\n\nclass Scanner(object):\n    \"\"\"\n        基本扫描器类\n        1. 根据目标和帐号密码生成扫描器列表\n        2. 对目标的扫描确认（由具体子类完成）\n    \"\"\"\n\n    def __init__(self, passwd, target, username, password):\n        self.logger = logging.getLogger(\"TotalPass\")\n        self.passwd = passwd\n        self.vendor = passwd.vendor\n        self.target = target\n        self.host = target.host\n        self.port = target.port or opts.port or passwd.port\n        self.username = username\n        self.password = password\n        self.evidence = \"\"\n\n    def __eq__(self, other):\n        return repr(self) == repr(other)\n\n    def __hash__(self):\n        \"\"\"\n            用来去重\n        \"\"\"\n        return hash(self.__repr__())\n\n    def __repr__(self):\n        return \"%s:%s@%s:%s\" % (self.username, self.password, self.host, self.port)\n\n    def __str__(self):\n        return \"#%s %s\" % (self.vendor, self.__repr__())\n\n    def scan(self) -> bool:\n        \"\"\"\n            处理扫描结果并返回是否成功\n        \"\"\"\n        if not opts.running:\n            return False\n        click.echo(\"Testing %s \" % self.__str__())\n        try:\n            self.evidence = self._check()\n            if not self.evidence:\n                raise InvalidCredential\n            # 只取第一行结果\n            self.evidence = self.evidence.split(\"\\n\")[0]\n            msg = \"[+] Found %s credential %s:%s at %s\" % (\n                self.vendor,\n                self.username,\n                self.password,\n                self.target,\n            )\n            click.secho(msg, fg=\"green\")\n            click.secho(self.evidence, fg=\"green\")\n            opts.result.append(msg)\n            return True\n        # except EOFError as e:\n        # print(e)\n        except Exception as e:\n            self.logger.info(\n                \"Invalid %s credential %s:%s at %s\"\n                % (self.vendor, self.username, self.password, self.target)\n            )\n            self.logger.info(\"%s Exception: %s\" % (type(e).__name__, str(e)))\n\n    def isopen(self) -> bool:\n        \"\"\"\n            检查端口是否开放\n        \"\"\"\n        s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n        try:\n            s.connect((self.host, int(self.port)))\n            s.shutdown(2)\n            self.logger.info(\"%s:%s is open.\" % (self.host, self.port))\n            return True\n        except:\n            self.logger.error(\"%s:%s is close.\" % (self.host, self.port))\n            return False\n\n    def _check(self) -> str:\n        \"\"\"\n            具体的扫描工作由子类完成并返回结果\n        \"\"\"\n        pass\n"
  },
  {
    "path": "totalpass/settings.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    配置和全局变量\n\"\"\"\nimport os\n\n\nclass Singleton(type):\n    _instances = {}\n\n    def __call__(cls, *args, **kwargs):\n        if cls not in cls._instances:\n            cls._instances[cls] = super(Singleton, cls).__call__(*args, **kwargs)\n        return cls._instances[cls]\n\n\nclass Options(metaclass=Singleton):\n    \"\"\"\n        全局配置\n    \"\"\"\n\n    def __init__(self):\n        self.passwds_path = os.path.join(\n            os.path.dirname(os.path.abspath(__file__)), \"payloads\"\n        )\n        self.passwds = []\n        self.targets = []\n        self.categories = []\n        self.vendor = \"\"\n        self.name = \"\"\n        self.port = 0\n        self.threads = 10\n        self.timeout = 7\n        self.timeout_alive = 2\n        self.common = \"\"\n        self.port_map = dict(\n            ftp=21,\n            ssh=22,\n            telnet=23,\n            smtp=25,\n            http=80,\n            snmp=161,\n            mysql=3306,\n            rdp=3389,\n            redis=6379,\n        )\n        self.result = []\n        self.running = False\n\n    def __repr__(self):\n        return self.info()\n\n    def info(self):\n        s = \"\"\n        s += \"Passwds Path: %s\\n\" % self.passwds_path\n        s += \"Passwds Count: %s\\n\" % len(self.passwds)\n        s += \"Categories: %s\\n\" % \", \".join(self.categories)\n        s += \"Port: %s\\n\" % self.port\n        s += \"Targets:\\n > \"\n        s += \",\\n > \".join([str(t) for t in self.targets])\n        return s\n\n\nopts = Options()\n"
  },
  {
    "path": "totalpass/target.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\n\"\"\"\n    格式化目标对象\n\"\"\"\n\nimport os\nimport re\nimport sys\nimport copy\nimport logging\nimport socket\nimport click\nfrom netaddr import IPNetwork\nfrom netaddr.core import AddrFormatError\nfrom .settings import opts\nfrom . import addons\n\n\nclass Target(object):\n    \"\"\"\n        测试目标对象，不同目标之间IP、端口、分类均不同\n    \"\"\"\n\n    logger = logging.getLogger(\"TotalPass\")\n\n    def __init__(self, host=None, port=None, category=None, protocol=None, url=None):\n        self.logger = Target.logger\n        self.host = host\n        port = port or opts.port\n        port = int(re.sub(r\"\\D\", \"\", str(port))) if port else None\n        self.port = port if port and 0 < port < 65535 else None\n        self.category = category or protocol\n        self.protocol = protocol\n        self.url = url\n\n    def __eq__(self, other):\n        return self.__dict__ == other.__dict__\n\n    def __repr__(self):\n        s1 = \"%s://\" % self.protocol if self.protocol else \"\"\n        s2 = self.host or \"\"\n        s3 = \":%s\" % self.port if self.port else \"\"\n        s = s1 + s2 + s3 if s2 else \"\"\n        return s\n\n    def alive(self) -> bool:\n        \"\"\"\n            检查端口是否开放\n        \"\"\"\n        if not self.port:\n            click.secho(\"[x] %s No port specified.\" % self.host, fg=\"red\")\n            return False\n        addr = (self.host, int(self.port))\n        try:\n            # 检测TCP\n            s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n            s.settimeout(opts.timeout_alive)\n            s.connect(addr)\n            s.close()\n            click.secho(\"[+] [TCP] %s:%s is open.\" % (self.host, self.port), fg=\"green\")\n            return True\n        except ConnectionRefusedError as e:\n            # 检测UDP\n            s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)\n            s.settimeout(opts.timeout_alive)\n            s.connect(addr)\n            s.close()\n            click.secho(\"[+] [UDP] %s:%s is open.\" % (self.host, self.port), fg=\"green\")\n            return True\n        except Exception as e:\n            click.secho(\"[x] %s:%s is close.\" % (self.host, self.port), fg=\"red\")\n            self.logger.debug(\"%s Exception: %s\" % (type(e).__name__, str(e)))\n            return False\n\n    def load_scanners(self) -> list:\n        \"\"\"\n            加载对应的扫描器\n        \"\"\"\n        scanners = []\n        if self.category and self.category in addons.__all__:\n            addon = sys.modules.get(\"%s.addons.%s\" % (__package__, self.category))\n            self.logger.info(\"Creating %s %s scanners...\" % (self.category, self))\n            for passwd in opts.passwds:\n                if passwd.category != self.category and passwd.category != opts.common:\n                    continue\n                for cred in passwd.credentials:\n                    scanners.append(\n                        addon.mkscanner(\n                            passwd,\n                            self,\n                            cred.get(\"username\", \"\"),\n                            cred.get(\"password\", \"\"),\n                        )\n                    )\n        else:\n            click.secho(\n                \"[x] #%s %s is not yet supported.\" % (self.category, self), fg=\"red\"\n            )\n        return scanners\n\n    @classmethod\n    def parse(cls, target) -> list:\n        \"\"\"\n            解析目标主机生成target list\n            target 可能是tuple/list/str或文件\n        \"\"\"\n        mid_targets = []  # 中间结果\n        ret_targets = []  # 最终结果（补全了端口）\n        if isinstance(target, str):\n            if os.path.isfile(target):\n                # TODO\n                pass\n            else:\n                mid_targets = cls._parse_str(target)\n        elif isinstance(target, tuple) or isinstance(target, list):\n            for t in target:\n                mid_targets += cls._parse_str(t)\n        # return mid_targets\n        # 为targets补全端口和分类\n        for t in mid_targets:\n            if t.category:\n                t.port = t.port or opts.port or opts.port_map.get(t.category, 0)\n                ret_targets.append(t)\n            else:\n                for cat in opts.categories:\n                    nt = copy.deepcopy(t)\n                    nt.category = cat\n                    nt.port = nt.port or opts.port or opts.port_map.get(cat, 0)\n                    ret_targets.append(nt)\n        return ret_targets\n\n    @classmethod\n    def _parse_str(cls, target) -> list:\n        \"\"\"\n            解析字符串形式的目标\n        \"\"\"\n        cls.logger.info(\"Parsing target %s\" % target)\n        if not isinstance(target, str):\n            cls.logger.error(\"Target %s is not str\" % target)\n            return []\n        target = target.strip().rstrip(\"/\")\n        targets = []\n        try:\n            for ip in IPNetwork(target).iter_hosts():  # (covers IP or cidr) #3,4\n                targets.append(Target(host=str(ip)))\n        except AddrFormatError:\n            if len(target.split(\":\")) == 3:\n                # mysql://127.0.0.1:3306\n                protocol = target.split(\":\")[0]\n                host = target.split(\":\")[1].replace(\"//\", \"\")\n                port = target.split(\":\")[2]\n                targets.append(Target(host=host, port=port, protocol=protocol))\n            elif \"://\" in target:\n                # snmp://127.0.0.1\n                protocol = target.split(\":\")[0]\n                host = target.split(\":\")[1].replace(\"//\", \"\")\n                targets.append(Target(host=host, protocol=protocol))\n            elif \":\" in target:\n                # 127.0.0.1:8080\n                host = target.split(\":\")[0]\n                port = target.split(\":\")[1]\n                targets.append(Target(host=host, port=port))\n            else:\n                targets.append(Target(host=target))\n\n        return targets\n"
  },
  {
    "path": "totalpass.py",
    "content": "#!/usr/bin/env python3\n# -*- coding=utf-8 -*-\n\nimport sys\nfrom os import path\n\nsys.path.insert(1, path.dirname(path.realpath(__file__)))\n\nif sys.version_info >= (3, 7):\n    import totalpass\n\n    if __name__ == \"__main__\":\n        totalpass.main()\n\nelse:\n    print(\"Python 3.7+ Only.\")\n"
  }
]