Skip to main content

Free Password Strength Meter: Real Entropy & Crack-Time

Test any password against entropy math, breach-corpus blacklists, keyboard runs, and leet-substitution patterns. Get a 0–4 score plus realistic crack-time estimates at four attack speeds. 100% offline — your password never leaves your browser.

Enter a password to analyze it.

Real Shannon Entropy

Charset size × length, then penalized for keyboard runs, repeated chars, sequential runs, leet substitutions, and year suffixes — the same heuristics used by professional security audits.

Breach-Corpus Lookup

Instant blacklist check against the ~120 most common passwords from rockyou and HIBP aggregate. If your password is there, no length or charset can save it.

Four Attack Speeds

See crack-time estimates at: online throttled (100/h), online unthrottled (10/s), offline slow hash (10K/s bcrypt), and offline fast hash (10B/s SHA-1 GPU).

Strictly Offline

No HIBP API call, no network request, no analytics ping. Pattern matching, entropy math, and breach checks all run in your browser. Safe for real credentials.

The Honest Password Strength Meter — No Theater, No Network Calls

Most online password meters are decorative. They turn the bar green when you add a capital letter and call it a day, missing that Password1! is in every attacker's top-100 dictionary. Worse, many quietly POST your password to a server for "analysis." That is the worst possible UX for a tool whose entire job is privacy. Our Free Online Password Strength Meter is built on the opposite principles: real entropy math, real pattern detection, real breach-corpus lookups — and zero network requests.

Pair this meter with our Password Generator to produce passwords that score 4 every time, the Hash Generator if you need to compare digests against a breach list locally, and the UUID Generator for one-time tokens and API secrets that do not need to be remembered.

How Long Does Each Class of Password Survive?

The table below assumes a modern offline attack on a SHA-1-hashed leak (~10¹⁰ guesses/second on a single high-end GPU). Times scale linearly with attacker hardware.

Password ProfileEntropy (bits)Offline GPU Crack Time
password0 (in corpus)instant
Summer2024!~28under 1 second (rule attack)
8 random lowercase~37~14 seconds
12 random mixed case + digits~71~80 years
16 random all-class~104heat death of the universe

The Patterns Attackers Exploit (and We Detect)

Keyboard Walks

`qwerty`, `asdfgh`, `1qaz2wsx` — these look complex but are in every cracking dictionary. Flagged with a major penalty.

Leet Substitution

`P@ssw0rd!`, `H3ll0123` — replacing letters with numbers does not fool rule-based attacks. We undo the substitution and re-check the blacklist.

Year Suffixes

`anything2024`, `mydog2023` — attackers try all 100+ years as suffixes by default. Flagged with a minor penalty.

Character Runs

`aaa`, `1111`, `xyz`, `cba` — both repeated and sequential runs shrink the effective search space dramatically.

A Production-Grade Password Hygiene Workflow

01

Generate, Don't Invent

Use our Password Generator to produce 16+ random characters across all four classes.

02

Score It Before Saving

Drop the generated password here. Confirm score 4 and zero issues before committing it to your password manager.

03

Unique Per Site

Every account gets its own password. Credential-stuffing attacks work because most users reuse a single "strong" password everywhere.

04

Add MFA

Even a score-4 password fails to phishing. Layer TOTP, hardware keys, or passkeys on every account that supports them.

Free Password Strength Meter: Real Entropy & Crack-Time Estimates | Toolk