Also see MSF/Wordlists for metasploit wordlists.
Wordlists included with Kali are in /usr/share/wordlists.
For example, here's how to use the rockyou password list:
$ cd /usr/share/wordlists $ gunzip rockyou.txt.gz $ ls -lh rockyou.txt
Kali Linux"The quieter you become, the more you are able to hear."
Penetration testing Linux distribution.
1 Physical Attacks: Kali/Layer 1 Attacks
2 Data/MAC Attacks: Kali/Layer 2 Attacks
3 Network Attacks: Kali/Layer 3 Attacks
4 Transport Attacks: Kali/Layer 4 Attacks
5 Session Attacks: Kali/Layer 5 Attacks
6 Presentation Attacks: Kali/Layer 6 Attacks
7 Application Attacks: Kali/Layer 7 Attacks
Kali on Raspberry Pi:
Flags · Template:KaliFlag · e
john the ripperpassword generator and all-around cracking tool.
Testing John: John the Ripper/Benchmarking
Using John on
Password generation using rules and modes: John the Ripper/Password Generation
Installing some useful password rules: John the Ripper/Rules
Using John to feed password guesses to Aircrack: Aircrack and John the Ripper
John the Ripper on AWS: Ubuntu/Barebones to JtR
Getting Passwords from John: John the Ripper/Password Recovery
Flags · Template:JohnFlag · e