a8Kx#2mQ9$rL Zp4&nW!fB7yT 3jR*cU0sH@5v Md6^eX1gN%iO w9Lq#Yr2Kt$8 P5!bA3mJ&Cz7 hF8@vS4nU*2e Qx1Wk^9Lp6Rt 0Gm$3YdI!cB5 tN7%oZ2aH#8j Rk7Nw0Bp3Gf6 Ye2Qs8Tj5Wo1 Uk4Rl9Hi3Qn7 Aj2Sh0Dm6Fp5 Cy8Bx1Gk3Lv7 Hn4Wt9Je2Ur0 Fz5Pm8Cr1Vb4 Xg7Jl0Qy3An6 Hz9Ui2Sk5Fm1 Tr8Ld4Nv0Kp3

Secure Password Generator

Generate strong, random passwords and secrets for accounts, apps, and APIs.

Passwords never leave your browser

For logins, accounts, and anywhere you type a password. Uses a full password character set.

Character types
Very Strong 0 bits of entropy

What This Tool Does

  • Generates random passwords using crypto.getRandomValues() from the Web Crypto API.
  • Uses rejection sampling to eliminate modulo bias, ensuring every character in the pool has an equal probability of being selected
  • Guarantees at least one character from each selected character set, then shuffles with a crypto-secure Fisher-Yates algorithm to avoid positional bias
  • Calculates and displays real-time entropy in bits so you can gauge password strength against brute-force attacks
  • Generates base64url-safe secrets for machine secrets and environment variables

This generator runs entirely client-side. No passwords are transmitted, stored, or logged on any server.

What Makes a Strong Password

Password strength comes down to entropy, which is the number of possible combinations an attacker would need to try. A password with 128 bits of entropy would take billions of years to crack with current hardware.

There are a few key factors that determine entropy:

  • Length matters most. Each additional character multiplies the number of possible combinations. A 20-character password from a 93-character pool has roughly 130 bits of entropy, which is well beyond what brute-force attacks can touch.
  • Character diversity helps. Using uppercase, lowercase, numbers, and symbols expands the pool of possible characters. A password drawn from all four sets (93 characters) is significantly stronger than one using only lowercase letters (26 characters) at the same length. That said, NIST SP 800-63B-4 no longer recommends requiring mixed character types as policy. Forced complexity rules tend to produce predictable patterns. For randomly generated passwords, though, a larger character pool directly increases entropy.
  • Randomness is non-negotiable. A long password like aaaaaaaaaaaaaaaa has zero effective entropy because it's trivially guessable. True randomness from a cryptographic source is what turns length and diversity into actual security.
  • Avoid dictionary words and patterns. Attackers don't just brute-force; they use wordlists, common substitutions (like @ for a), and keyboard patterns. Randomly generated passwords sidestep all of these attack vectors.
  • Never reuse passwords. Even a strong password becomes a liability if it's used across multiple services. A breach on one site gives attackers the key to every other account using the same credentials. Use a unique password for every service and store them in a password manager.

The entropy values shown by this tool assume the password is generated randomly from the full selected character pool. Human-chosen passwords with the same characters will have significantly lower effective entropy due to predictable patterns.

References & Specifications

The following standards and resources are relevant to password security and authentication best practices: