Password Strength Checker
Check password strength with detailed scoring. Shows entropy, estimated crack time, and criteria breakdown. Includes a secure password generator.
Strength
—Very WeakWeakFairStrongVery Strong
Score
0
out of 100
Crack Time
—
offline, 10B guesses/sec
Entropy
—
bits
Criteria Breakdown
At least 8 characters
At least 12 characters
Contains lowercase letters (a–z)
Contains uppercase letters (A–Z)
Contains digits (0–9)
Contains special characters
No common passwords or patterns
No sequential characters (abc, 123)
No repeated characters (aaa, 111)
Password Generator
16
864
How to Use Password Strength Checker
- 1Enter a password to check its strength.
- 2View the strength score, entropy, and crack time.
- 3Check which criteria pass or fail.
- 4Use the generator to create a strong password.
Zenovay
Privacy-first analytics for your website
Understand your visitors without invasive tracking. GDPR compliant, lightweight, and powerful.
Related Tools
Password GeneratorGenerate strong, random passwords with customizable length, characters, and complexity.
Password Strength CheckerCheck how strong your password is. Get an estimated crack time and improvement suggestions.
HMAC GeneratorGenerate HMAC signatures using SHA-256, SHA-384, or SHA-512 with the Web Crypto API.
AES Encryption/DecryptionEncrypt and decrypt text using AES-GCM with PBKDF2 key derivation. Runs entirely in your browser.
Frequently Asked Questions
What makes a strong password?▾
A strong password combines length (12+ characters), character variety (uppercase, lowercase, digits, and symbols), and avoids common words, sequential patterns like "123" or "abc", and repeated characters. Length is the single most important factor — a random 16-character password is exponentially harder to crack than an 8-character one, even with symbols.
What is password entropy and why does it matter?▾
Password entropy, measured in bits, quantifies the unpredictability of a password. It is calculated as log2(charset_size) × length. Higher entropy means more possible combinations, making brute-force attacks harder. A password with 60+ bits of entropy is generally considered strong; 80+ bits is very strong for most threat models.
What are the most common password attacks?▾
The main attack types are: (1) Brute force — trying every possible combination; (2) Dictionary attacks — using lists of common words and passwords; (3) Credential stuffing — replaying leaked username/password pairs from data breaches; (4) Rainbow table attacks — using precomputed hash lookups. Using unique, random, long passwords defeats all of these.
Should I use a password manager?▾
Yes. Password managers (1Password, Bitwarden, Dashlane, etc.) generate and store long, unique, random passwords for every site, so you only need to remember one strong master password. This eliminates password reuse — the single biggest real-world security risk — and makes it practical to use 20+ character passwords everywhere.
Does two-factor authentication (2FA) make my password less important?▾
2FA adds a critical second layer of security, but it does not make your password unimportant. A weak password combined with SMS 2FA can still be compromised via SIM-swapping or phishing. Best practice is to use both a strong, unique password and a strong 2FA method (TOTP app or hardware key like YubiKey) together.