Skip to content
100% in your browser. Nothing you paste is uploaded — all processing runs locally. Read more →

Password Strength Checker

Paste a password — see its entropy in bits and a realistic crack-time estimate. We penalise the patterns crack tools actually try first (leet-speak, dictionary words, year suffixes, sequential digits).

— bits

    What this checks

    What it does not check

    FAQ

    Is anything I type sent anywhere?

    No. The strength check runs entirely in your browser — open DevTools → Network and verify. The password is never logged, transmitted, or stored.

    How is 'crack time' estimated?

    Crack time = 2^entropy / guesses-per-second. We assume an attacker with consumer GPUs (~10¹⁰ guesses/sec for a fast hash like SHA-256). For weak server-side hashing, this is realistic. For strong hashing (bcrypt, argon2id), the same password is far harder to crack — so the 'crack time' here is a conservative upper bound on attacker cost.

    Why does my password show 'weak' when it has 12 characters and a symbol?

    Length isn't the same as entropy. P@ssw0rd123! is 12 characters but the structure (capital + word + leet-speak digits + symbol) is so common that crack tools test it in the first thousand attempts. The entropy meter penalises common patterns — capitalisation only at start, leet-speak substitutions, dictionary words, sequential digits.