Abuse Case: As an attacker, I have access to hundreds of millions of valid username and password combinations for credential stuffing. Abuse Case: As an attacker, I have default administrative account lists, automated brute force, and dictionary attack tools I use against login areas of the application and support systems. Abuse Case: More @Wikipedia
Hover over any link to get a description of the article. Please note that search keywords are sometimes hidden within the full article and don't appear in the description or title.