Password Generator

Generate strong, random passwords with your preferred settings. Runs 100% in your browser - nothing is saved or sent.

Click Generate to create a password
Password Strength -
664

Tips for strong passwords

  • Use at least 12–16 characters for good security
  • Mix uppercase, lowercase, numbers and symbols
  • Use a unique password for every account
  • Store passwords in a password manager like Bitwarden or 1Password
  • Never share your passwords or store them in plain text files

Weak and reused passwords are the number one cause of account breaches. According to Verizon's Data Breach Investigations Report, over 80% of hacking-related breaches involve stolen or weak passwords. A strong password needs to be long (at least 16 characters), completely random, unique to every account, and contain a mix of uppercase letters, lowercase letters, numbers, and symbols. This free password generator creates cryptographically secure random passwords directly in your browser - they are never sent to any server, never logged, and are immediately ready to copy into a password manager.

How to Generate a Strong Password

1

Set your password length

Use the length slider to choose a password length between 8 and 64 characters. For most online accounts, 16 characters is the recommended minimum. For high-value accounts like banking, email, and password managers themselves, use 20 or more characters. Longer passwords are exponentially harder to crack - a 20-character password has trillions of times more possible combinations than a 12-character password.

2

Choose your character types

Toggle which character sets to include: uppercase letters (A-Z), lowercase letters (a-z), numbers (0-9), and symbols (!@#$%^&*). Including all four character types maximises the password's entropy and complexity. Some websites exclude certain symbols - if a site rejects your generated password, regenerate with symbols disabled or toggle specific character sets until you find a combination the site accepts.

3

Generate and check the strength indicator

Click Generate to create a new random password. The strength indicator shows how strong the generated password is based on length and character variety. Aim for a "Strong" or "Very Strong" rating for any account you care about. Click Generate multiple times to get different options - each click produces a completely new random password.

4

Copy and save in a password manager

Click the Copy button to copy the password to your clipboard. Immediately paste it into your password manager (1Password, Bitwarden, Dashlane, LastPass, or your browser's built-in password manager). Do not try to memorise generated passwords - they are designed to be random and unmemorizable. A password manager will remember them and autofill them for you across all your devices.

Why Password Security Matters More Than Ever

Data breaches happen constantly. Major companies including LinkedIn, Adobe, Dropbox, Twitter, and thousands of smaller sites have had their password databases compromised. When a breach occurs, hackers obtain hashed passwords and attempt to crack them using dictionary attacks, rainbow tables, and brute-force methods. A weak or short password can be cracked in seconds or minutes. A strong 16-character random password would take billions of years to crack using current computing technology.

But even a strong password is not enough if you reuse it across multiple sites. When one site is breached, attackers try the stolen email-password combination on hundreds of other sites (credential stuffing attacks). Using a unique password for every account means a breach at one site cannot compromise your others. Password managers make this practical by remembering all your unique passwords so you only need to remember one master password.

Understanding Password Entropy and Strength

Password strength is measured in bits of entropy - a mathematical measure of randomness and unpredictability. Higher entropy means the password is harder to guess or crack. Here is how entropy scales with password composition:

A password using only lowercase letters (26 characters) has log₂(26) ≈ 4.7 bits of entropy per character. Adding uppercase doubles the charset to 52 characters: 5.7 bits per character. Adding numbers (62 characters): 5.95 bits per character. Adding symbols (95 characters): 6.57 bits per character. A 16-character password using all character types therefore has 16 × 6.57 = 105 bits of entropy - astronomically secure against brute-force attacks.

For comparison: a simple 8-character password using only lowercase letters has just 37.6 bits of entropy, which modern GPUs can crack in minutes. This is why length matters so much more than complexity alone - adding just 4 characters to a password dramatically increases its security.

Using the Password Generator for Different Account Types

Email accounts - use at least 20 characters with all character types. Email is the master key to your online life because most password resets go through email. If your email is compromised, every other account is at risk.

Banking and financial accounts - 20+ characters with all character types. Some banks have restrictive password policies (maximum length, no symbols) - adjust the character settings accordingly.

Social media accounts - 16-20 characters. Social media accounts are frequently targeted by hackers wanting to post spam or scam followers.

Password manager master password - this is the most important password you have. Use 25-30 characters and memorise it - this is the one password you should remember rather than store.

Wi-Fi networks - 20+ characters. Wi-Fi passwords are stored and rarely need to be typed (devices remember them), so length is not an inconvenience here.

Work and corporate accounts - follow your organisation's password policy, but if given a choice, use the maximum allowed length with all character types.

Password Patterns to Avoid - Common Weak Password Types

Even if a password meets length and character requirements, certain patterns make it vulnerable to targeted attacks. Here are the most common weak password patterns and why they fail:

Dictionary words with substitutions - P@ssw0rd, L3tMe1n, S3cur1ty. Attackers use dictionaries with common character substitutions (a→@, e→3, i→1, o→0) as standard practice. These passwords appear complex to humans but are trivial for automated cracking tools.

Keyboard patterns - qwerty, asdfgh, 1q2w3e4r, zxcvbn. Keyboard walks (typing adjacent keys in sequence) are in every password cracking dictionary. They may look random but follow obvious spatial patterns.

Personal information with numbers - JohnSmith1985, Emma2024, SydneyAustralia. Names, cities, birth years, sports teams, and other personal information can be discovered from social media and used to generate targeted password guesses.

Repeating patterns - abcabc123123, password1password1. Repeating the same substring multiple times to meet length requirements provides no additional security - attackers try these patterns automatically.

Simple sequences - 123456, abcdef, qwerty123. Numeric sequences, alphabetic sequences, and simple progressions are always in the top-10 most common passwords list from every data breach.

Date-based passwords - Summer2024, January2025, 15March1990. Dates are easily guessed and frequently changed, leading people to use predictable variations (incrementing the year each time a password expires).

The solution: Use this generator to create truly random passwords with no patterns, words, or personal information. Random passwords defeat all dictionary attacks, pattern-based attacks, and targeted guessing.

How to Remember Your Master Password

While all your account passwords should be random and stored in a password manager, you need one master password you can remember to unlock the password manager itself. Here are proven techniques for creating and remembering a strong master password:

Passphrase method: String together 6-8 random words to create a long, memorable passphrase. "correct horse battery staple" is the famous example from XKCD. Use a dice-based word list (Diceware) to ensure true randomness. Example: "elephant-trombone-butterfly-glacier-volcano-crimson" is 48 characters long and memorable with practice.

Sentence method: Create a sentence that is personal and memorable to you, then use the first letter of each word plus punctuation. "My daughter Emma was born in Sydney on the 15th of March 1990!" becomes "MdEwbiSot15oM1990!" - 18 characters with numbers and symbols.

Physical practice: Type your master password 10 times per day for a week. Muscle memory makes typing the password automatic even if you cannot consciously recall all the characters. Write it down and store it in a safe or secure location until you have fully memorised it.

Master password requirements: Your master password should be 25-30 characters minimum, contain no dictionary words (or use 6+ words if using passphrase method), and be unique - never used for any other account. This is the only password that must be both strong AND memorable.

Password Manager Integration Best Practices

Here is the optimal workflow for using this generator with password managers:

Step 1: Generate a password at 20+ characters with all character types enabled. Copy it immediately.

Step 2: During account creation or password reset, paste the generated password into the site's password field. Most password managers will detect this and offer to save it automatically.

Step 3: Ensure the password manager saved both the username and password for the correct website. Many password managers ask you to confirm the URL - verify it matches the actual site domain.

Step 4: Test the saved password by logging out and using the password manager's autofill to log back in. This confirms the password was saved correctly.

Pro tips:

Enable two-factor authentication (2FA) in the password manager itself for additional security. Use biometric unlock (fingerprint, face recognition) on mobile devices to reduce the frequency of typing your master password. Enable breach monitoring to get notified if any of your saved passwords appear in data breaches. Audit your stored passwords quarterly to update old or weak passwords and remove accounts you no longer use.

Common Password Security Mistakes and How to Fix Them

Mistake 1: Using a short password because it is easier to type. You should rarely type passwords manually - password managers autofill them. Prioritise security over typing convenience. Use 20+ characters for all accounts.

Mistake 2: Reusing a password across multiple low-value accounts "because they do not matter." When one of those low-value accounts is breached (and they will be), attackers try the password on high-value targets like email and banking. Every account needs a unique password.

Mistake 3: Sharing passwords via email, SMS, or messaging apps. These are insecure channels - messages can be intercepted or accessed if the recipient's account is compromised. Use a secure password sharing feature built into password managers (1Password, Bitwarden) or a temporary secure link service (like OneTimeSecret) that expires after one viewing.

Mistake 4: Writing passwords in a plain text file or spreadsheet. These files are readable by anyone who gains access to your computer, including malware. If you must keep a password backup outside your password manager, encrypt the file with strong encryption (AES-256) or store it in a physically secure location (safe).

Mistake 5: Using the "Exclude Ambiguous Characters" option unnecessarily. While this makes passwords slightly easier to read, it reduces the character set and therefore the password's entropy. Only enable this if you must type the password frequently by reading it from a printout (rare for most users).

Learn More About Password Security

For more information about password security best practices and cryptographic standards:

Frequently Asked Questions

How secure are passwords generated by this tool?
Passwords are generated using the Web Cryptography API's crypto.getRandomValues() function, which uses the operating system's cryptographically secure random number generator (CSPRNG). This is the same randomness source used in professional security software and is suitable for generating passwords for any purpose including financial accounts and cryptographic keys. The passwords are truly random - not based on any pattern, dictionary word, or seed value.
Are my generated passwords stored or logged anywhere?
No. Passwords are generated entirely within your browser and are never transmitted to any server. No password you generate is ever logged, stored, or seen by anyone other than you. When you close the page, the password is gone. This is why it is important to copy the password immediately and save it in your password manager before closing the browser tab.
What is a good password length?
For most online accounts, 16 characters is the recommended minimum. For high-value accounts (email, banking, password managers), use 20 or more characters. For very high-security purposes, 25-30 characters provides essentially unbreakable security with current technology. The strength indicator in the tool shows you how each length and character combination rates.
What symbols are included in the generated passwords?
The symbol set includes: ! @ # $ % ^ & * ( ) _ - + = [ ] { } | ; : ' " , . < > ? /. If a specific website rejects a password containing certain symbols, you can disable the symbols option and regenerate, or contact the site to ask which symbols are allowed in their password field.
Should I use a password manager with generated passwords?
Yes, absolutely. Strong randomly generated passwords are designed to be secure, not memorable. You should not attempt to memorise them. A password manager like Bitwarden (free and open source), 1Password, Dashlane, or your browser's built-in password manager will store all your passwords securely and autofill them when needed. This lets you use a different strong password for every account without any memorisation burden.
How secure is a 16-character random password?
A 16-character password using all character types (uppercase, lowercase, numbers, symbols - 95 possible characters) has 95^16 possible combinations, which is approximately 4.4 × 10^31. Even if an attacker could try one trillion passwords per second, cracking such a password by brute force would take approximately 1.4 × 10^12 years - far longer than the age of the universe. For all practical purposes, a 16-character random password is unbreakable.
What makes a password weak?
Weak passwords share one or more of these characteristics: they are short (under 10 characters), they contain dictionary words or names, they follow predictable patterns (Password123, Summer2024, CompanyName!1), they are reused across multiple sites, or they contain personal information like birth dates or pet names. All of these make a password vulnerable to dictionary attacks, pattern-based cracking, or credential stuffing after a data breach.
How often should I change my passwords?
Modern security guidance recommends changing passwords only when there is evidence of compromise (data breach, suspicious activity), not on a schedule. Frequent mandatory password changes (every 30 or 90 days) often lead to weaker passwords as users make small predictable variations (Password1 → Password2 → Password3). Instead, use strong unique random passwords, enable two-factor authentication, and use a password manager to monitor for breaches. Change immediately if a service you use reports a data breach.
Can I generate multiple passwords at once?
Yes. This tool can generate multiple random passwords in one click if you need to create accounts for several services at once or generate passwords for a team. Each generated password is cryptographically independent - there is no pattern or relationship between them. Generate as many as you need and save each one in your password manager immediately with a note about which account it is for.