MaximCalculator Free, fast & accurate calculators
🛡️ Security & privacy-friendly
🌙Dark Mode

Password Strength Checker

Test how strong your password is with a score, entropy estimate, and actionable suggestions. This tool runs locally in your browser (no server calls). Use it to improve passwords for accounts, Wi‑Fi, vaults, and apps — then share a screenshot of your score with friends or teammates.

📊0–100 strength score + meter
🧠Entropy estimate (bits) + risk flags
⏱️Crack‑time hints (online vs offline)
🎲One‑tap strong password generator

Check your password

Paste a password below to get a strength score and improvement tips. For safety, avoid pasting passwords you actively use on high‑value accounts on a shared computer.

🔐
Tip: Longer + unique beats “complex but short”. Aim for 14–20+ characters.
📏
16+ is a great default.
🔡
Passphrases are easy to remember & strong when long.
Your strength result will appear here
Type a password and tap “Check Strength” to see your score.
This tool estimates strength using length, variety, patterns, and entropy — it does not transmit your password anywhere.
Scale: 0 = weak ¡ 50 = okay ¡ 70 = good ¡ 85+ = strong.
WeakOkayStrong

Improvement tips

    Details

    Entropy—
    Character set—
    Pattern flags—
    Estimated crack time—

    Educational tool only. Real attack difficulty depends on factors like hashing method, rate limits, MFA, breach exposure, and whether your password is unique.

    🧮 How it works

    How the Password Strength Checker calculates your score

    Password strength is not a single magical number — it’s an estimate of how hard a password is to guess under common attack scenarios. This checker combines three practical ideas: length, character variety, and pattern penalties. It then gives you a simple 0–100 score with clear tips for improvement.

    First, the tool looks at length. Longer passwords drastically increase the number of possible combinations an attacker must try. A 16‑character password can be astronomically stronger than a 10‑character password, even if the 10‑character password has symbols. That’s why the score boosts quickly when you pass common safety thresholds like 12, 14, 16, and 20 characters.

    Next, we estimate character set size (also called the alphabet size). If you use only lowercase letters, the “alphabet” is about 26 characters. Add uppercase, and it becomes ~52. Add digits and it becomes ~62. Add symbols and it grows further (often 80–90+ depending on what symbols are allowed). A bigger character set increases the possible combinations — but it only helps a lot when the password is also reasonably long.

    Then we apply pattern penalties because real attackers don’t brute‑force randomly first — they use smarter guesses. The checker flags common patterns that reduce strength: repeated characters (aaaaaa), simple sequences (123456, abcdef), keyboard runs (qwerty), and “word + digits” formats (Summer2026!). These passwords might look complex, but they appear early in real‑world guessing lists.

    Entropy formula (simple)

    We also show an entropy estimate in bits. The “textbook” approximation is: entropy ≈ length × log2(character_set_size). This comes from counting how many different strings exist if each character is chosen independently at random from a set. For example, a 16‑character password from a 62‑character set has: 16 × log2(62) ≈ 16 × 5.95 ≈ 95 bits of estimated entropy.

    Important: entropy is an upper bound for human‑made passwords. If you choose predictable words, patterns, or personal info, the “effective entropy” is lower. That’s why the pattern flags matter: they subtract points and convert “looks complex” into “actually guessable” when patterns are detected.

    Crack-time hints

    We also show rough crack‑time hints for two scenarios: online guessing (slow, rate-limited, like a website login) and offline guessing (fast, like cracking a stolen password hash). Online attacks might be limited to tens or hundreds of guesses per second. Offline attacks can be billions of guesses per second for weak hashing or specialized hardware. Your real risk depends on the site’s security, hashing algorithm, and whether you use MFA — so treat crack times as educational, not guaranteed.

    🧪 Examples

    Password strength examples (and what to fix)

    These examples show why “complex” isn’t the same as “strong”, and how small changes can create big gains. (Don’t copy these exact passwords — create your own unique versions.)

    Example 1: Short + predictable
    • Password: Summer2026!
    • Why it’s weak: common word + year + symbol is a classic pattern in leaked lists.
    • Fix: use a long passphrase: summer-lakes-quiet-moon-2026 (or generated random).
    Example 2: Looks random, but too short
    • Password: F7!qZ2#k
    • Why it’s only “okay”: 8 characters may be brute‑forced offline faster than you think.
    • Fix: keep the randomness but increase length: F7!qZ2#k9v@Lx3P!
    Example 3: Long passphrase (highly recommended)
    • Password: river-candle-otter-sapphire-quiet
    • Why it’s strong: long length gives high search space even with simple characters.
    • Fix: ensure it’s unique per account, and avoid famous quotes.
    Example 4: Repeats & sequences
    • Password: aaaabbbb1234
    • Why it’s weak: repeats + numeric sequence collapses effective entropy.
    • Fix: remove repeats and patterns; use generator or a longer phrase.

    A good rule: if you can “explain” your password pattern in one sentence, an attacker can probably guess it faster than a truly random password or a long, unique passphrase.

    📌 Formula breakdown

    Score components (0–100)

    To keep results consistent across devices, the score is built from several components that add up and then clamp to the 0–100 range. The exact number isn’t a security guarantee — it’s a ranking tool to help you improve.

    1) Length score (0–55 points)

    Length is weighted heavily. The tool awards more points as length increases, with noticeable boosts at 12, 14, 16, and 20 characters. Below 10 characters is penalized because short passwords are often crackable offline.

    2) Variety score (0–25 points)

    Using different character types increases the search space. Points are awarded for including: lowercase, uppercase, digits, and symbols. (A long passphrase may score strong mainly from length even without symbols.)

    3) Pattern penalties (0 to −35 points)

    If the password includes repeating runs (aaaa), sequences (abcd, 1234), keyboard patterns (qwerty), or common passwords/words, points are subtracted. This is because attackers try common patterns first, so the password is effectively easier than raw entropy suggests.

    4) Uniqueness guidance (tips)

    The checker can’t know whether you reuse this password elsewhere (that’s a behavior, not a string property), so it reminds you: the strongest password becomes weak if reused. Breaches + password reuse are a top driver of account takeovers.

    Finally, we produce a label: Weak, Fair, Good, Strong, or Very Strong — and we generate tips that target what your password is missing (length, variety, or pattern issues).

    ❓ FAQ

    Frequently Asked Questions

    • Does this tool save or upload my password?

      No. The analysis runs in your browser only. There are no network requests. Still, for peace of mind, avoid testing real passwords on shared/public devices.

    • Why does a long passphrase score higher than a short complex password?

      Because length grows the search space exponentially. A 20‑character passphrase can be far harder to brute‑force than a 9‑character “complex” password, even if the shorter one has symbols.

    • Is the crack-time estimate accurate?

      It’s a rough educational hint. Real cracking depends on hashing algorithms, salts, GPU/ASIC hardware, and the attacker’s strategy. Treat it as a “ballpark”, not a promise.

    • What’s the single best upgrade I can make today?

      Stop reusing passwords and turn on MFA. Then use a password manager to generate 16–24 character unique passwords.

    • What’s a good master password for a password manager?

      A long, unique passphrase (4–6 random words) that you’ve never used anywhere else, ideally 20+ characters. Example format: river-candle-otter-sapphire-quiet.

    • Should I include symbols?

      Symbols can help, but only if your password is already reasonably long. Many sites also restrict symbols, so the safest strategy is usually: long + unique, with symbols as a bonus.

    MaximCalculator provides simple, user-friendly tools. For accounts that matter, use a password manager, enable MFA, and keep passwords unique.