Wordlists tailored for ReconNinja penetration testing
Simulate attack scenarios for cybersecurity training