HomeTools › Password Strength
Free Tool

Password Strength Analyzer

Get a real entropy calculation and a crack-time estimate against modern hardware. We flag dictionary words, keyboard walks, and the top 10,000 leaked passwords. Your password is never transmitted.

Password
Enter a password above
Length
Character pool
Entropy
Score
Analysis
Start typing a password to see the analysis.
100% client-side. Your password is analyzed in your browser. We never transmit it, store it, or log it — this page has no backend. You can open DevTools → Network and confirm nothing leaves.

How password strength is measured

The real strength of a password is the entropy an attacker has to burn to guess it — not whether it has "one uppercase, one number, one symbol." A 20-character passphrase of random words ("correct horse battery staple") has ~77 bits of entropy. An 8-character password with mixed case, a number, and a symbol ("P@ssw0rd!") has ~25 bits if you count the pool naively, but ~4 bits in practice because it is in every cracking dictionary in existence.

Our scoring model

We compute entropy as log2(pool_size) × length, then apply penalties for:

Crack-time estimates

The "time to crack" figures assume an attacker with modern GPU hardware performing an offline attack on a stolen hash. For bcrypt or Argon2, a single GPU does roughly 10,000 guesses/second. For unsalted SHA-256 (don't do this), a GPU does billions/second, and a rented 8-GPU cluster does trillions. We report both so you can see the difference a slow hash function makes.

Beyond strength: the enterprise password problem

Even a perfect password fails if it's reused, stored in plaintext, or emailed to a colleague. That's why this tool is a teaching aid, not a solution. At enterprise scale you need:

Catch hardcoded passwords before they ship

SF365's Secret Scanner ships with 81 pre-compiled regex patterns covering AWS/Azure/GCP, AI API keys, GitHub tokens, database connection strings, and yes — hardcoded passwords. Every commit, every branch.

Start Free Trial →