Is my password stored or transmitted?
No. The analysis runs entirely in your browser using JavaScript. Nothing you enter is sent to any server.
Security
Enter any password to see a detailed strength analysis including entropy, estimated crack time at modern attack speeds, and specific weaknesses to address.
Generated output
Enter a password to see the strength analysis.
Entropy is calculated as log₂(C^L), where C is the effective character set size (determined by which character classes are present) and L is the password length. This gives the theoretical number of guesses needed to exhaust all possibilities by brute force.
Crack time is estimated at 10 billion guesses per second — a realistic figure for a dedicated offline attack using modern GPU hardware. Patterns such as dictionary words, keyboard walks (qwerty, 12345), and repeated characters are flagged as weaknesses since attackers apply these rules before brute-forcing.
The password "password123" has an entropy of about 58 bits using only lowercase + digits. However, it contains a common dictionary word and a sequential number suffix — both are in every attack dictionary, meaning the real-world crack time is seconds, not billions of years.
A randomly generated password like "kR7#mP2@wQ9!" uses all character classes at 12 characters — about 79 bits of entropy. Estimated crack time at 10B guesses/sec: over 1 million years.
Answers to common questions about this generator and how it works.
No. The analysis runs entirely in your browser using JavaScript. Nothing you enter is sent to any server.
Because length increases entropy exponentially. A 20-character lowercase password has more theoretical combinations than an 8-character password using all character sets. Length is the most important factor.
It assumes an offline attack at 10 billion guesses per second — a conservative estimate for a well-resourced attacker with the hashed password. Online attacks against login forms are rate-limited and far slower.
For maximum caution, avoid entering real passwords into any online tool. Use it to test the structure of a password type rather than an actual credential.
Attackers use rule-based attacks before brute force — applying common substitutions (@ for a, 3 for e), appending numbers, and trying dictionary words with modifications. A password matching these patterns is cracked far faster than its raw entropy suggests.
Explore other generators that pair well with this one.
Generate strong, unique passwords with custom length and character sets.
Generate secure, memorable word-based passphrases with custom word count and separator.
Generate secure API tokens, keys, and random secrets in hex or base64 format.