: Attackers or researchers compile lists from previous data breaches or by using tools to create a "Cartesian product" of common usernames and passwords.
The "story" of how these files are used typically follows a specific procedural path in penetration testing or malicious hacking:
: In Destiny 2 communities, "Combo Lists" refer to wishlists for weapon combinations (perks and elements).
The name "combos.txt" also appears in more specialized technical "stories":