Security

Password Strength & Entropy Checker

Check entropy, estimate brute-force time, and verify strength without sending any data.

The Password Strength Checker estimates entropy based on length and character variety, then provides a brute-force time estimate at different guessing speeds. It gives a practical sense of how resilient a password is against common attack scenarios, all computed locally in your browser.

Zero data sent - everything runs locally.

Results

Entropy score, strength rating, and brute-force estimate.

Entropy

-

Strength

-

Charset size

-

Bruteforce estimate

-

Length

-

Character types

-

What this tool does

The Password Strength Checker estimates entropy based on length and character variety, then provides a brute-force time estimate at different guessing speeds. It gives a practical sense of how resilient a password is against common attack scenarios, all computed locally in your browser.

When to use this tool

Use it when evaluating a new password, reviewing an existing credential, or validating a password policy for a team. If you need to create a stronger option, generate a new one in Password Generator and check the results here.

How it works

The tool estimates the size of the character set (lowercase, uppercase, numbers, symbols) and calculates entropy based on the password length. It then estimates the time to brute-force the password at the selected guessing rate. Results are shown as an easy-to-read strength rating and time estimate.

Example use case

You are setting a policy that requires strong passwords for admin accounts. Test a sample password in the checker, review the entropy and estimated crack time, and adjust the policy to require a longer length or additional character types. Share the guidance with your team before rollout.

Use cases

  • Evaluate candidates for a new password policy.
  • Check the quality of an existing credential.
  • Compare passphrase options before rollout.

Notes & limitations

Entropy estimates assume truly random passwords, which is rarely the case for human-created phrases. Password managers and generated values are more consistent. The brute-force estimates are simplified and do not account for rate limits or online lockouts, so treat them as general guidance rather than exact predictions.

Online attacks are often limited by lockout policies, but offline attacks against leaked hashes can be much faster. Use this tool to compare relative strength, then align your password policy with the sensitivity of the system. Longer lengths usually provide more benefit than adding a single extra symbol.

If a password feels strong but scores poorly, increase length first before adding complexity rules.

Buy Me a Coffee at ko-fi.com