Check your password
Paste a password below to get a strength score and improvement tips. For safety, avoid pasting passwords you actively use on highâvalue accounts on a shared computer.
Test how strong your password is with a score, entropy estimate, and actionable suggestions. This tool runs locally in your browser (no server calls). Use it to improve passwords for accounts, WiâFi, vaults, and apps â then share a screenshot of your score with friends or teammates.
Paste a password below to get a strength score and improvement tips. For safety, avoid pasting passwords you actively use on highâvalue accounts on a shared computer.
Password strength is not a single magical number â itâs an estimate of how hard a password is to guess under common attack scenarios. This checker combines three practical ideas: length, character variety, and pattern penalties. It then gives you a simple 0â100 score with clear tips for improvement.
First, the tool looks at length. Longer passwords drastically increase the number of possible combinations an attacker must try. A 16âcharacter password can be astronomically stronger than a 10âcharacter password, even if the 10âcharacter password has symbols. Thatâs why the score boosts quickly when you pass common safety thresholds like 12, 14, 16, and 20 characters.
Next, we estimate character set size (also called the alphabet size). If you use only lowercase letters, the âalphabetâ is about 26 characters. Add uppercase, and it becomes ~52. Add digits and it becomes ~62. Add symbols and it grows further (often 80â90+ depending on what symbols are allowed). A bigger character set increases the possible combinations â but it only helps a lot when the password is also reasonably long.
Then we apply pattern penalties because real attackers donât bruteâforce randomly first â they
use smarter guesses. The checker flags common patterns that reduce strength:
repeated characters (aaaaaa), simple sequences (123456, abcdef),
keyboard runs (qwerty), and âword + digitsâ formats (Summer2026!).
These passwords might look complex, but they appear early in realâworld guessing lists.
We also show an entropy estimate in bits. The âtextbookâ approximation is: entropy â length Ă log2(character_set_size). This comes from counting how many different strings exist if each character is chosen independently at random from a set. For example, a 16âcharacter password from a 62âcharacter set has: 16 Ă log2(62) â 16 Ă 5.95 â 95 bits of estimated entropy.
Important: entropy is an upper bound for humanâmade passwords. If you choose predictable words, patterns, or personal info, the âeffective entropyâ is lower. Thatâs why the pattern flags matter: they subtract points and convert âlooks complexâ into âactually guessableâ when patterns are detected.
We also show rough crackâtime hints for two scenarios: online guessing (slow, rate-limited, like a website login) and offline guessing (fast, like cracking a stolen password hash). Online attacks might be limited to tens or hundreds of guesses per second. Offline attacks can be billions of guesses per second for weak hashing or specialized hardware. Your real risk depends on the siteâs security, hashing algorithm, and whether you use MFA â so treat crack times as educational, not guaranteed.
These examples show why âcomplexâ isnât the same as âstrongâ, and how small changes can create big gains. (Donât copy these exact passwords â create your own unique versions.)
Summer2026!summer-lakes-quiet-moon-2026 (or generated random).F7!qZ2#kF7!qZ2#k9v@Lx3P!river-candle-otter-sapphire-quietaaaabbbb1234A good rule: if you can âexplainâ your password pattern in one sentence, an attacker can probably guess it faster than a truly random password or a long, unique passphrase.
To keep results consistent across devices, the score is built from several components that add up and then clamp to the 0â100 range. The exact number isnât a security guarantee â itâs a ranking tool to help you improve.
Length is weighted heavily. The tool awards more points as length increases, with noticeable boosts at 12, 14, 16, and 20 characters. Below 10 characters is penalized because short passwords are often crackable offline.
Using different character types increases the search space. Points are awarded for including: lowercase, uppercase, digits, and symbols. (A long passphrase may score strong mainly from length even without symbols.)
If the password includes repeating runs (aaaa), sequences (abcd, 1234),
keyboard patterns (qwerty), or common passwords/words, points are subtracted. This is because attackers
try common patterns first, so the password is effectively easier than raw entropy suggests.
The checker canât know whether you reuse this password elsewhere (thatâs a behavior, not a string property), so it reminds you: the strongest password becomes weak if reused. Breaches + password reuse are a top driver of account takeovers.
Finally, we produce a label: Weak, Fair, Good, Strong, or Very Strong â and we generate tips that target what your password is missing (length, variety, or pattern issues).
No. The analysis runs in your browser only. There are no network requests. Still, for peace of mind, avoid testing real passwords on shared/public devices.
Because length grows the search space exponentially. A 20âcharacter passphrase can be far harder to bruteâforce than a 9âcharacter âcomplexâ password, even if the shorter one has symbols.
Itâs a rough educational hint. Real cracking depends on hashing algorithms, salts, GPU/ASIC hardware, and the attackerâs strategy. Treat it as a âballparkâ, not a promise.
Stop reusing passwords and turn on MFA. Then use a password manager to generate 16â24 character unique passwords.
A long, unique passphrase (4â6 random words) that youâve never used anywhere else, ideally 20+ characters.
Example format: river-candle-otter-sapphire-quiet.
Symbols can help, but only if your password is already reasonably long. Many sites also restrict symbols, so the safest strategy is usually: long + unique, with symbols as a bonus.
20 interlinks from the Everyday category:
MaximCalculator provides simple, user-friendly tools. For accounts that matter, use a password manager, enable MFA, and keep passwords unique.