Generate & Check
Secure Passwords
Create strong, cryptographically random passwords in seconds. Check if your password has appeared in a data breach, analyze its strength, and build memorable passphrases — all processed entirely in your browser. Nothing is ever stored or transmitted.
Uses the HaveIBeenPwned k-anonymity API — your actual password never leaves your browser.
How it works: Your password is hashed with SHA-1. Only the first 5 characters of that hash are sent to the API. The full hash and your password are never transmitted — this is called k-anonymity.
Type any word or phrase — converted into a stronger password using letter substitutions like a→@, o→0, i→!, e→3.
Substitution Map
Generates cryptographically random PINs of 4, 6, 8 and custom lengths. Useful for bank PINs, device lock codes and access codes.
Security note: All PINs are generated using crypto.getRandomValues() — the same cryptographic API used by your browser for secure operations. No patterns, no repetition.
How to Use
- Set the length — drag the Password Length slider left or right. The number updates live and a new password generates instantly with every movement. Start at 16 or higher for strong passwords.
- Choose character sets — four chips control which characters are included:
A–Zuppercase letters,a–zlowercase letters,0–9digits, and!@#$%^&*symbols. Click any chip to toggle it on or off. At least one chip must remain active at all times. - Read the strength meter — below the password you will see a coloured bar and label (Very Weak → Weak → Fair → Strong → Very Strong), a score out of 4, the estimated crack time, and entropy in bits. These update automatically on every slider move or character set change.
- Copy the password — click the copy icon on the right of the password display. A "Copied!" tooltip confirms the password is on your clipboard. Paste it straight into your password manager.
- Enter your password — type or paste the password you want to check into the input field. Click the eye icon on the right to reveal or hide the characters as you type.
- Run the check — press
Enteron your keyboard or click the blue Check for Data Breaches button. A spinner appears while the lookup runs. - Read the result — a red badge shows how many times it was found in known breaches. A green badge means it was not found in any of the 800 million+ compromised passwords in the database.
- Take action — if the password is breached, stop using it immediately. Switch to the Generator tab to create a strong replacement, then update it in your password manager and on the affected site.
- Type your base word or phrase — enter any word, name, or short phrase you can easily remember, such as your pet's name, a favourite place, or a lyric fragment. The longer the phrase, the stronger the result.
- Pick a substitution level — Basic replaces only the most common letters (a→@, o→0, i→!, e→3, s→$). Full applies a broader set of substitutions including uppercase variants (t→7, l→1, g→9, b→8 and more). The substitution map at the bottom of the card shows every replacement.
- Choose what to append — the Append dropdown adds random digits or a symbol at the end. Options are nothing, 2 random digits, 4 random digits, or 1 random symbol. Adding digits significantly increases entropy.
- Copy the result — the converted password appears in the display box. Click the copy icon to send it to your clipboard. The strength meter below shows how strong the result is.
ILoveCoffee — with Full substitution and 2 appended digits it becomes something like !L0v3C0ff33 plus two random digits, which scores Strong while remaining memorable.- Type or paste any password — start typing in the input field and the full analysis appears immediately. Every keystroke updates the results in real time so you can watch the score change as you add characters or symbols.
- Understand the strength bar — the four coloured bars represent the score from 0 (Very Weak) to 4 (Very Strong). The label and score badge below the crack time give you a clear verdict at a glance.
- Study the crack time grid — four scenarios are shown: online attack throttled at 100 attempts per hour, online attack at 10 attempts per second, offline fast hash, and offline slow hash. The slow hash figure is the most realistic worst case for a properly stored password.
- Review the character breakdown — a panel shows total length, uppercase, lowercase, digits, special characters, and unique character count. Non-zero counts are highlighted in blue; a low unique-character ratio is shown in red.
- Follow improvement suggestions — if your password is weak, a panel lists specific actions such as adding symbols, avoiding common words, or increasing length.
- Use the preset cards — when you open the PIN tab, four cards are generated automatically for 4-digit, 6-digit, 8-digit and 10-digit PINs. Each card has its own copy icon so you can grab any one immediately.
- Generate a custom length PIN — drag the Custom PIN Length slider to any value between 4 and 16 digits. The custom PIN updates on every slider movement.
- Copy your PIN — click the copy icon next to a preset card to copy that specific PIN, or use the copy icon in the main display box for your custom PIN.
- Regenerate all PINs — click the refresh icon in the custom PIN display to regenerate all four preset cards and the custom PIN at once.
crypto.getRandomValues() — the browser's cryptographically secure random number generator, far stronger than Math.random(). A 4-digit PIN has only 10,000 possible values — use 6 digits or more wherever the service allows it.- Set the word count — drag the Number of Words slider to choose between 3 and 10 words. A new passphrase generates automatically. More words means exponentially more entropy — 5 words gives roughly 60 bits, 7 words gives roughly 84 bits.
- Choose a word separator — the dropdown lets you pick how words are joined: dash, dot, underscore, space, at sign, hash, exclamation mark, or no separator. A non-letter separator adds entropy and satisfies many password policies.
- Append numbers — the Append Numbers dropdown adds 0, 1, 2, or 4 random digits to the end. Appending even 2 digits meaningfully increases the number of possible combinations.
- Toggle capitalisation — makes each word start with an uppercase letter (e.g. Tiger-Cloud-River). Many sites require at least one uppercase character, so this keeps the passphrase compliant.
- Copy the passphrase — click the copy icon. The strength meter and entropy reading update each time a new passphrase is generated.
Tiger-Cloud-River-Boot-42 is easier to type and remember than xK!9mP#2qL, yet has comparable or greater entropy. Ideal for master passwords, Wi-Fi keys, and any credential you need to type from memory.Frequently Asked Questions
crypto.getRandomValues()). No password, input, or result is ever sent to our servers, logged, stored in a database, or transmitted over the network in any form. You can disconnect from the internet after the page loads and every tool will continue to work exactly the same way. The source code runs entirely client-side and can be inspected in your browser's developer tools at any time.length × log₂(character set size). For example, a 16-character password using all 94 printable ASCII characters has 16 × log₂(94) ≈ 104 bits of entropy. In practical terms: 40 bits is weak, 60 bits is reasonable, 80 bits is strong, and 100+ bits is considered very strong against all known attacks.