Skip to main content
~/makemydev/password-generator

$password-generator

Generators

Generate cryptographically secure random passwords or memorable passphrases. Tune length, character classes, and bulk count. Runs entirely in your browser via the Web Crypto API.

4128
Character classes
Options
5 results130 bits of entropyExcellent
  • 12<^Pc)E+5r{PYR%&7Vq)
  • 2rl-)7{e7Ad,Z,Nt#G3GM
  • 3uR71Hl!u9M0TbWp;V>-9
  • 49M#@/3W7IyWIMBu@vD3e
  • 5@P<e4X,8CLg@GXAbXTLC

How to generate a strong password

A password is only as strong as its entropy — the number of random bits that went into picking it. This tool uses the browser's Web Crypto API (crypto.getRandomValues) with rejection sampling so every character is drawn uniformly from the selected pool. Nothing is ever sent to a server.

  1. Pick a mode. Random passwords maximize entropy per character — best when a manager will store them for you. Passphrases are easier to type on a phone and easier to read aloud when you need to share them once.
  2. Tune the length.Aim for at least 16 characters for new accounts, or 20+ if the password will guard a long-lived secret (SSH key passphrase, encrypted backup). Keep “require at least one of each selected class” on so sites with strict rules accept the output on the first try.
  3. Exclude look-alikes if someone will transcribe it. The toggle strips characters that are easy to confuse in common fonts (0/O, 1/l/I, plus a few ambiguous symbols). Leave it off for machine-handled passwords — stripping characters lowers entropy per slot.
  4. Generate in bulk. Crank up the count to get a stack of candidates, then pick the one you like. Use the Copy all or Download button to keep the full list when seeding test users or rotating a fleet of service accounts.

Password vs passphrase — which to pick?

A 20-character password with all four classes enabled has roughly 131 bits of entropy — effectively impossible to brute-force. A 6-word passphrase from the 256-word list here has ~48 bits, or ~64 bits at 8 words. Both are strong enough for everyday accounts. Choose passphrases when you'll need to type the secret on a touchscreen or dictate it to a phone-support rep; choose random passwords when a password manager is in the loop.

Never roll your own hashing to “protect” a password you generate here. Sites store passwords using bcrypt, scrypt, or Argon2 — dedicated slow-hash functions with built-in salting. Plain SHA-256 or MD5 of a password is the wrong tool for storage.