Secure Password Generator
Client-side only. Uses crypto.getRandomValues for high-entropy randomness.
Passphrase mode (optional)
Uses a compact embedded wordlist to keep the file small. Add your own words in the code if you prefer.
Estimated Entropy
0 bits
Guide: 64b=strong • 80b=very strong • 100b+=excellent
Offline crack time (ballpark)
–
Estimates assume modern GPU rigs (10¹² guesses/s). Real risk also depends on reuse, leaks, MFA, etc.
Tips: Prefer ≥16 chars (or 5–7 random words). Don’t reuse passwords. Use a password manager. Enable MFA where possible.