Password Generator
Strong passwords, generated in your browser. Never sent anywhere.
Press Space on the output to regenerate
How to Use
- Choose your length β Use the slider or type a number between 4 and 128 characters.
- Pick character types β Toggle uppercase, lowercase, digits, and symbols on or off. Enable "Exclude ambiguous" to avoid confusing characters like 0/O and 1/l.
- Click Generate β A new random password appears instantly. Every click produces a completely new password.
- Copy your password β Click the Copy button or click the password itself. A confirmation appears immediately.
Random String vs. Passphrase
A random string (e.g. k8$Rz!mP2xQn) packs maximum entropy per character β ideal for password managers and systems that accept any character.
A passphrase (e.g. correct-horse-battery-staple) is easier to remember and type, especially on mobile. With the bundled EFF Large Wordlist (7,776 words) each word adds about 12.9 bits of entropy, so 4 words give ~51 bits and 6 words give ~77 bits.
Tips for Specific Use Cases
- Banking & finance: Use 16+ characters with all character types enabled.
- Gaming accounts: 12β16 characters usually suffice; avoid ambiguous characters if you type it manually.
- AWS root / cloud admin: Use 20+ characters or a 5+ word passphrase β these protect critical infrastructure.
- Wi-Fi WPA2/WPA3: Use 20+ characters or a 4-word passphrase. Maximum is 63 characters for WPA2.
Examples
Entropy vs. Length
| Length | Character Set | Entropy (bits) | Rating |
|---|---|---|---|
| 8 | Lowercase only (26) | ~38 | Weak |
| 8 | All classes (~95) | ~53 | Fair |
| 12 | All classes (~95) | ~79 | Strong |
| 16 | All classes (~95) | ~105 | Very Strong |
| 4 words | EFF Large Wordlist (7,776) | ~51 | Fair |
| 6 words | EFF Large Wordlist (7,776) | ~77 | Strong |
| 8 words | EFF Large Wordlist (7,776) | ~103 | Very Strong |
Are the passwords stored or sent anywhere?
No. Every password is generated entirely in your browser using your device's built-in cryptographic random number generator. No passwords are ever sent to our servers, stored in any database, or logged in any analytics. You can verify this by disconnecting from the internet β the tool works fully offline.
How does this tool generate randomness?
We use crypto.getRandomValues(), a cryptographically secure pseudo-random number generator (CSPRNG) built into every modern browser. This is the same quality of randomness used by encryption software and operating systems β far superior to Math.random(), which is predictable and should never be used for security.
How long should my password be?
Use 12 characters minimum for general accounts, 16+ for important accounts (email, banking, cloud services), and 20+ for high-value targets (admin accounts, crypto wallets, infrastructure). With all character types enabled, a 16-character password has about 105 bits of entropy β effectively unbreakable by brute force.
Should I use symbols, or is a passphrase enough?
Both can produce strong passwords. Random strings with symbols are shorter but harder to type and remember; passphrases are longer but easier to memorize. With the bundled EFF Large Wordlist (7,776 words) each word adds ~12.9 bits, so a 4-word passphrase reaches ~51 bits and 6 words reaches ~77 bits. If your password manager handles typing, random strings with symbols are more space-efficient.
How do I make a password I can remember?
Switch to Passphrase mode. It generates a sequence of random English words (e.g. "marble-forest-candle-echo") that is far easier to remember than a random string. Use at least 4 words for basic security and 6 words for important accounts. You can visualize a story connecting the words to aid memory.
Why are some characters excluded by default?
The "Exclude ambiguous characters" option removes characters that look alike in many fonts: 0 (zero) vs O, 1 (one) vs l vs I, and 5 vs S. This is helpful when you need to manually type a password on a device without paste (ATMs, game consoles, shared terminals). It is off by default to maximize entropy.
Can I use this tool offline?
Yes. Once the page is loaded, it works entirely offline. All password generation, strength calculation, and copying happen in your browser with no server communication. You can disconnect from the internet and continue generating passwords β try it to verify.
Is this tool open source? How can I verify it runs locally?
You can inspect the page source in your browser (right-click β View Page Source) to see that all generation logic runs client-side. Open your browser's Developer Tools β Network tab and confirm zero requests are made when you generate or copy passwords. You can also disconnect from the internet to verify full offline operation.
What is entropy and how is it calculated here?
Entropy measures how unpredictable a password is, expressed in bits. The formula is bits = length Γ log2(charset size). For example, a 16-character password from 95 possible characters has about 105 bits of entropy, meaning an attacker would need roughly 2^105 guesses to crack it by brute force. For passphrases it is word count Γ log2(wordlist size); with the bundled EFF Large Wordlist of 7,776 words, 6 words land at about 77 bits. Strength labels: Weak (<40 bits), Fair (40β59), Strong (60β79), Very Strong (80+).
How do I generate many passwords at once?
Enable Bulk generation at the bottom of the tool. Set a count (1β100) and click "Generate Bulk." You can copy individual passwords, copy all at once, or download the full list as a TXT or CSV file. Bulk mode works with both random string and passphrase modes.
Common Mistakes to Avoid
- Reusing passwords across sites. If one site is breached, every account sharing that password is compromised. Generate a unique password for each account.
- Using personal information. Birthdays, pet names, and dictionary words are trivially cracked. Always use randomly generated passwords.
- Choosing too-short passwords. An 8-character password (even with symbols) can be cracked in hours with modern hardware. Use at least 12 characters.
- Pasting into untrusted forms. Only enter generated passwords on sites you trust. Malicious forms can capture clipboard contents.
How It Works β Privacy & Security
This tool is built with a strict no-network architecture:
- Client-side generation: All passwords are created using your browser's built-in crypto.getRandomValues() β the same cryptographic-grade randomness used by operating systems and encryption software.
- Zero network calls: No data is sent to any server during generation, copying, or strength calculation. Open DevTools β Network tab to verify.
- No password storage: Generated passwords are never saved to localStorage, cookies, or any persistent storage. Only your preferences (length, character settings) are remembered for convenience.
- No analytics on values: We never log, track, or transmit any generated password β not even in anonymized form.
- Works offline: Load the page once, disconnect from the internet, and the tool continues to function perfectly.
- Pick a length of 16+ characters or 4+ passphrase words for everyday accounts.
- Enable all character classes for the strongest entropy per character.
- Use "Exclude ambiguous" only when you need to type the password by hand.
- Press the Space key on the output to regenerate without leaving the keyboard.
- Open Developer Tools β Network tab to verify nothing is sent off your device.