Ethical hackers and security researchers do not download fresh lists to hack people. They locate them to analyze leaked data and notify affected users.
If you are analyzing a list for authorized penetration testing or security research, never download it to your main operating system.
Ensure the data is strictly in username:password or email:password format.
