Skip to main content

Password generator

Random passwords and passphrases, free and unlimited

Generate cryptographically secure passwords in one click. Choose between random passwords (password generator) and memorable passphrases (passphrase generator). Entropy, crack time, and strength score in real time.

Generation mode
••••••••••••••••
16

Your password is generated server-side using cryptographic randomness (crypto/rand) and transmitted over HTTPS. No password is ever stored or logged.

Random passwords

Cryptographic generation with configurable length (4-128) and character types: uppercase, lowercase, digits, and symbols.

Memorable passphrases

Random word combinations that are easy to remember and type. Ideal for master passwords and account recovery.

Real-time strength indicator

Entropy in bits, security score, and estimated brute-force crack time based on 10^12 guesses per second.

Secure cryptographic generation

Passwords are generated using Go's crypto/rand (CSPRNG) and transmitted over HTTPS. No password is ever stored or logged.

Advanced customization

Exclude similar characters (0O, 1lI), configure passphrase separators, and set up character exclusion lists.

Why use a password generator?

Weak or reused passwords remain the leading cause of online account compromises. According to the 2024 Verizon DBIR report, 80% of breaches involve stolen or guessed credentials. A password generator eliminates human bias and creates truly random credentials.

The problem with manually created passwords:

Humans are bad at generating randomness. We reuse the same patterns: first name + birth year, pet's name + "123", a dictionary word with a "!" at the end. These passwords fall in seconds to a dictionary attack.

What a generator solves:

  • True randomness: no patterns, dictionary words, or personal information
  • Calibrated strength: adjust length, character types, and entropy to your needs
  • Instant generation: create a new password in milliseconds
  • Consistency: same level of security for every password generated

How to use the generator in 3 steps

Step 1: choose the generation mode

Two modes are available:

  • Random: mixed individual characters (e.g., k7#Qm9!xR2pL$wN4). Maximum entropy per character. Ideal when a password manager stores the password for you.
  • Memorable: passphrases made of random words (e.g., Sloppily8-Rosy3-Unlocking8-Angelic4). Easier to remember and type, with high entropy thanks to the number of words.

Step 2: adjust parameters

In Random mode:

  • Length: 4 to 128 characters (recommended: 16+ for sensitive accounts)
  • Character types: uppercase, lowercase, digits, symbols
  • Exclusions: similar characters (0/O, 1/l/I), custom characters

In Memorable mode:

  • Word count: 3 to 10 (recommended: 4+ words)
  • Separator: hyphen, space, period, custom
  • Options: capitalization, adding digits between words

Step 3: copy and use

Click the copy button. The password is copied to your clipboard. Use it immediately in your password manager or in the service's sign-up form.

The strength indicator displays the entropy (in bits), security score, and estimated brute-force crack time in real time.


Random vs. Memorable: when to use each mode

CriterionRandom modeMemorable mode
Entropy per character~6.5 bits (95 ASCII chars)~12.9 bits per word (7,776 Diceware words)
Examplek7#Qm9!xR2pL$wN4Sloppily8-Rosy3-Unlocking8
Ease of memorizationImpossible without a managerPossible with effort
Ease of typingDifficult (symbols, mixed case)Easy (common words)
Ideal use caseAccounts stored in a managerMaster password, PIN, shared access

When to choose Random:

  • Web accounts stored in 1Password, Bitwarden, or KeePass
  • API keys and service credentials
  • Any password you will never need to type manually

When to choose Memorable:

  • Your password manager's master password (the only one you memorize)
  • Unlock codes you type frequently (lock screen)
  • Shared passwords you need to communicate verbally

Understanding password entropy

Entropy measures unpredictability in bits. Each bit doubles the number of possible combinations. The formula is: entropy = log2(number_of_combinations).

Practical example:

  • An 8-character password from 26 lowercase letters: log2(26^8) = 37.6 bits
  • The same with uppercase + lowercase + digits (62 chars): log2(62^8) = 47.6 bits
  • With symbols added (95 chars): log2(95^8) = 52.6 bits
  • 16 characters from 95 chars: log2(95^16) = 105.2 bits
EntropyStrengthTime to crack (10^12 guesses/sec)
<28 bitsVery weakSeconds
28-35 bitsWeakMinutes to hours
36-59 bitsFairDays to years
60-127 bitsStrongThousands to billions of years
≥ 128 bitsVery strongBeyond any foreseeable technology

The 10^12 guesses/second threshold corresponds to a brute-force attack using modern GPU hardware (graphics card cluster). For an online service with rate limiting, actual time would be considerably longer.


Password security best practices

NIST SP 800-63B recommendations (2024)

The National Institute of Standards and Technology (NIST) has updated its password recommendations. Major changes from older practices:

Old practiceCurrent NIST recommendation
Change passwords every 90 daysOnly change if compromised
Require special charactersPrioritize length over complexity
Minimum 8 charactersMinimum 8, recommended 15+
Security questionsProhibited (too predictable)
Password hintsProhibited

The 5 essential rules

  1. One unique password per service: if one service is compromised, the others remain protected
  2. Length > complexity: correcthorsebatterystaple (25 chars, ~58 bits) is more secure and more memorable than P@$$w0rd (8 chars, ~30 bits)
  3. Use a password manager: 1Password, Bitwarden, or KeePass to store hundreds of unique passwords
  4. Enable 2FA everywhere: TOTP (Google Authenticator, Authy) or FIDO2 security key on all critical accounts
  5. Check for breaches: visit Have I Been Pwned to find out if your credentials have been exposed in a data breach

Password examples and their strength

TypeExampleEntropyTime to crackVerdict
Common wordpassword~0 bitsInstant (dictionary)Catastrophic
First name + yearMarie1990~20 bitsSecondsVery weak
Random 8 charsk7#Qm9!x~52 bitsDaysFair
Random 12 charsk7#Qm9!xR2pL~79 bitsThousands of yearsStrong
Random 16 charsk7#Qm9!xR2pL$wN4~105 bitsBillions of yearsVery strong
4-word passphraseCorrect-Horse-Battery-Staple~52 bitsDays to monthsFair
5-word passphrase + digitsSloppily8-Rosy3-Unlocking8-Angelic4-Brisk7~85 bitsMillions of yearsStrong

The ideal compromise for most users: a 16+ character random password stored in a manager, with a 5+ word passphrase as the master password.


How does the generation work?

Cryptographic generation (CSPRNG)

Our generator uses Go's crypto/rand, a CSPRNG (Cryptographically Secure Pseudo-Random Number Generator) that relies on operating system entropy sources:

  • /dev/urandom on Linux
  • CryptGenRandom on Windows
  • SecRandomCopyBytes on macOS

Unlike standard pseudo-random generators (Math.random() in JavaScript, random in Python), a CSPRNG produces unpredictable output even for an attacker who knows the previous values.

Generation process

  1. Character pool calculation: depending on the enabled options (uppercase, lowercase, digits, symbols), the pool contains between 10 and 95 characters
  2. Random draw: for each position in the password, a random byte is drawn via the CSPRNG and converted to an index in the pool
  3. Entropy calculation: log2(pool_size^length) gives the entropy in bits
  4. Crack time estimation: based on 10^12 guesses/second (offline GPU attack)
  5. Secure transmission: the password is returned over HTTPS and is never stored, logged, or cached

Complementary tools

ToolPurpose
Case converterTransform text case (UPPER, lower, Title, camelCase)
Base64 encoder/decoderEncode sensitive data for transport
Text statisticsAnalyze the length and composition of a text
Slug generatorTransform text into a URL-safe identifier

Useful resources