Password Strength Checker

Test how strong your password is. See estimated crack time, entropy, and get actionable suggestions. Nothing leaves your browser.

Use + D to bookmark this tool
pwgen — check strength
guest@pwgen:~$ check strength --analyze
[info] your password is analyzed locally — never transmitted
[info] we check against common patterns, dictionary words, and known breaches

How Password Strength Is Measured

Password strength is primarily measured in bits of entropy — a mathematical measure of randomness. Higher entropy means more possible combinations an attacker must try. A truly random password's entropy is calculated as: entropy = length × log₂(pool_size)

However, real-world password strength depends on more than just character count. Our checker also analyzes patterns (keyboard walks, repeated characters), common substitutions (@ for a, 3 for e), dictionary words, and known breached passwords to give a more realistic strength estimate.

Entropy vs. Crack Time

EntropyCombinationsGPU Crack TimeRatingExample
20 bits1 million< 1 secondInstant4-digit PIN
35 bits34 billion3.4 secondsWeak6-char lowercase
50 bits1.1 quadrillion1.3 daysFair8-char mixed case
65 bits3.7 × 10¹⁹117 yearsStrong10-char alphanumeric
80 bits1.2 × 10²⁴3.8M yearsExcellent14-char all types
128 bits3.4 × 10³⁸10²⁰ yearsOverkill20-char random

GPU crack times assume 10 billion guesses/sec (hashcat with MD5/SHA-1). Bcrypt/Argon2 hashing makes these 10,000x–100,000x slower.

Common Password Mistakes

Dictionary Words

Using real words — even obscure ones — drastically reduces entropy. Attackers use dictionaries with millions of words, names, and phrases. "sunshine", "monkey", and "shadow" are in every cracking wordlist.

Predictable Substitutions

Replacing 'a' with '@', 'e' with '3', 'o' with '0' feels clever but adds almost zero security. Cracking tools apply these substitution rules automatically. "P@ssw0rd" is no stronger than "Password".

Keyboard Patterns

"qwerty", "asdfgh", "zxcvbn", "1qaz2wsx" — these patterns are in every attacker's ruleset. Even diagonal patterns like "qazwsx" are well-known and tested early in any attack.

Personal Information

Names, birthdays, pet names, sports teams, and cities are the first things targeted attackers try. Social media makes this information trivially available. Never use anything personally identifiable.

Password Strength by Character Pool

Character SetPool SizeBits/Char8-Char Entropy12-Char Entropy
Digits only103.326.6 bits39.9 bits
Lowercase264.737.6 bits56.4 bits
Mixed case525.745.6 bits68.4 bits
Alphanumeric625.9547.6 bits71.5 bits
All printable ASCII956.5752.6 bits78.8 bits

These are theoretical maximums for truly random passwords. Real passwords with patterns, words, or repetition have significantly less effective entropy.

Understanding Crack Times

Online Attack (1,000/sec)

Rate-limited web login attempts. Most sites lock accounts after a few failures. Even a weak password might survive, but you shouldn't rely on this.

Offline Attack — CPU (10M/sec)

Attacker has stolen hashed passwords and is cracking them on a standard computer. Bcrypt and Argon2 hashing slows this dramatically.

Offline Attack — GPU (10B/sec)

Modern GPUs can compute billions of hashes per second for weak algorithms like MD5 or SHA-1. This is the standard we test against.

Massive Cluster (1T/sec)

Nation-state level resources. Even at this speed, a 20-character random password from the full ASCII set would take billions of years.

More Security Tools

🔒

Password Generator

Generate strong, random passwords with customizable length, character sets, and options.

💬

Passphrase Generator

Generate strong, memorable passphrases from random words. Easier to remember, just as secure.

🧠

Memorable Password Generator

Create easy to remember passwords from random words or your own phrases with leet speak conversion.

Bulk Password Generator

Generate multiple unique passwords at once. Perfect for IT admins and account provisioning.

🔑

API Key Generator

Generate cryptographically secure API keys, tokens, and secrets in multiple formats.

📡

WiFi Password Generator

Generate strong, easy-to-share WiFi passwords for your home or office network.

📱

WiFi QR Code Generator

Create a scannable QR code for your WiFi network. Guests connect instantly.

🔓

WiFi QR to Password Converter

Extract the WiFi password from a QR code image. Upload or paste — no camera needed.

🔢

PIN Generator

Generate cryptographically random PIN codes. Perfect for device locks and access codes.

🧮

Password Entropy Calculator

Calculate the exact entropy of any password configuration. See bits, combinations, and crack times.

#️⃣

MD5 Hash Generator

Generate MD5 hashes from any text. Useful for checksums, cache keys, and legacy system compatibility.

#️⃣

SHA-512 Hash Generator

Generate SHA-512 hashes using the native Web Crypto API. 512-bit security for signatures and integrity.

Login Barcode Generator

Generate a Code 128 barcode that types username, TAB, password, ENTER into login forms when scanned.

📺

Easy-Type Password Generator

Generate passwords optimized for TVs, game consoles, and devices with on-screen keyboards. No symbols.

🗣

Pronounceable Password Generator

Generate speakable passwords from fake syllables. Easy to say aloud, type from memory, and share verbally.

🌈

Password Generator for Kids

Generate fun, memorable passwords children can actually remember. Word stories: red-panda-jumps-42.

Frequently Asked Questions

Is my password sent anywhere?

No. All analysis happens in your browser using JavaScript. Nothing is transmitted over the network. You can verify by checking your browser's developer tools network tab while using this tool.

What score should I aim for?

80+ is excellent for most purposes. For critical accounts (banking, email, password manager master password), aim for 90+. Below 40 means your password is vulnerable.

Why is my 'complex' password scored low?

Common patterns like "P@ssw0rd!" use predictable substitutions that attackers check first. Real strength comes from randomness and length, not clever tricks.

My password is long but scores poorly?

Length alone isn't enough. "aaaaaaaaaaaaaaaa" is 16 characters but trivially crackable. Repeated characters, dictionary words, and common phrases reduce effective entropy significantly.

How is crack time calculated?

We estimate time based on 10 billion guesses per second (modern GPU cluster with MD5/SHA-1). Real crack times depend on the hashing algorithm used — bcrypt and Argon2 are 10,000x slower to crack.

Should I trust online password checkers?

Only if they run entirely in your browser. Our tool never transmits your password — all analysis is client-side JavaScript. Avoid any checker that requires you to submit your password to a server.

Copied to clipboard ✓