What is this supposed to be used for other than malicious attacks?
Recovery, but lets face it.. 99% of the time its for malicious attacks.
I use them all the time in penetration testing as do countless other people I have met in the same line of work. I am not offering the software to use these lists nor am I offering the knowledge of how to use said software.