Password Generator
Generate strong, random passwords with your preferred settings. Runs 100% in your browser - nothing is saved or sent.
Tips for strong passwords
- Use at least 12–16 characters for good security
- Mix uppercase, lowercase, numbers and symbols
- Use a unique password for every account
- Store passwords in a password manager like Bitwarden or 1Password
- Never share your passwords or store them in plain text files
Weak and reused passwords are the number one cause of account breaches. According to Verizon's Data Breach Investigations Report, over 80% of hacking-related breaches involve stolen or weak passwords. A strong password needs to be long (at least 16 characters), completely random, unique to every account, and contain a mix of uppercase letters, lowercase letters, numbers, and symbols. This free password generator creates cryptographically secure random passwords directly in your browser - they are never sent to any server, never logged, and are immediately ready to copy into a password manager.
How to Generate a Strong Password
Set your password length
Use the length slider to choose a password length between 8 and 64 characters. For most online accounts, 16 characters is the recommended minimum. For high-value accounts like banking, email, and password managers themselves, use 20 or more characters. Longer passwords are exponentially harder to crack - a 20-character password has trillions of times more possible combinations than a 12-character password.
Choose your character types
Toggle which character sets to include: uppercase letters (A-Z), lowercase letters (a-z), numbers (0-9), and symbols (!@#$%^&*). Including all four character types maximises the password's entropy and complexity. Some websites exclude certain symbols - if a site rejects your generated password, regenerate with symbols disabled or toggle specific character sets until you find a combination the site accepts.
Generate and check the strength indicator
Click Generate to create a new random password. The strength indicator shows how strong the generated password is based on length and character variety. Aim for a "Strong" or "Very Strong" rating for any account you care about. Click Generate multiple times to get different options - each click produces a completely new random password.
Copy and save in a password manager
Click the Copy button to copy the password to your clipboard. Immediately paste it into your password manager (1Password, Bitwarden, Dashlane, LastPass, or your browser's built-in password manager). Do not try to memorise generated passwords - they are designed to be random and unmemorizable. A password manager will remember them and autofill them for you across all your devices.
Why Password Security Matters More Than Ever
Data breaches happen constantly. Major companies including LinkedIn, Adobe, Dropbox, Twitter, and thousands of smaller sites have had their password databases compromised. When a breach occurs, hackers obtain hashed passwords and attempt to crack them using dictionary attacks, rainbow tables, and brute-force methods. A weak or short password can be cracked in seconds or minutes. A strong 16-character random password would take billions of years to crack using current computing technology.
But even a strong password is not enough if you reuse it across multiple sites. When one site is breached, attackers try the stolen email-password combination on hundreds of other sites (credential stuffing attacks). Using a unique password for every account means a breach at one site cannot compromise your others. Password managers make this practical by remembering all your unique passwords so you only need to remember one master password.
Understanding Password Entropy and Strength
Password strength is measured in bits of entropy - a mathematical measure of randomness and unpredictability. Higher entropy means the password is harder to guess or crack. Here is how entropy scales with password composition:
A password using only lowercase letters (26 characters) has log₂(26) ≈ 4.7 bits of entropy per character. Adding uppercase doubles the charset to 52 characters: 5.7 bits per character. Adding numbers (62 characters): 5.95 bits per character. Adding symbols (95 characters): 6.57 bits per character. A 16-character password using all character types therefore has 16 × 6.57 = 105 bits of entropy - astronomically secure against brute-force attacks.
For comparison: a simple 8-character password using only lowercase letters has just 37.6 bits of entropy, which modern GPUs can crack in minutes. This is why length matters so much more than complexity alone - adding just 4 characters to a password dramatically increases its security.
Using the Password Generator for Different Account Types
Email accounts - use at least 20 characters with all character types. Email is the master key to your online life because most password resets go through email. If your email is compromised, every other account is at risk.
Banking and financial accounts - 20+ characters with all character types. Some banks have restrictive password policies (maximum length, no symbols) - adjust the character settings accordingly.
Social media accounts - 16-20 characters. Social media accounts are frequently targeted by hackers wanting to post spam or scam followers.
Password manager master password - this is the most important password you have. Use 25-30 characters and memorise it - this is the one password you should remember rather than store.
Wi-Fi networks - 20+ characters. Wi-Fi passwords are stored and rarely need to be typed (devices remember them), so length is not an inconvenience here.
Work and corporate accounts - follow your organisation's password policy, but if given a choice, use the maximum allowed length with all character types.
Password Patterns to Avoid - Common Weak Password Types
Even if a password meets length and character requirements, certain patterns make it vulnerable to targeted attacks. Here are the most common weak password patterns and why they fail:
Dictionary words with substitutions - P@ssw0rd, L3tMe1n, S3cur1ty. Attackers use dictionaries with common character substitutions (a→@, e→3, i→1, o→0) as standard practice. These passwords appear complex to humans but are trivial for automated cracking tools.
Keyboard patterns - qwerty, asdfgh, 1q2w3e4r, zxcvbn. Keyboard walks (typing adjacent keys in sequence) are in every password cracking dictionary. They may look random but follow obvious spatial patterns.
Personal information with numbers - JohnSmith1985, Emma2024, SydneyAustralia. Names, cities, birth years, sports teams, and other personal information can be discovered from social media and used to generate targeted password guesses.
Repeating patterns - abcabc123123, password1password1. Repeating the same substring multiple times to meet length requirements provides no additional security - attackers try these patterns automatically.
Simple sequences - 123456, abcdef, qwerty123. Numeric sequences, alphabetic sequences, and simple progressions are always in the top-10 most common passwords list from every data breach.
Date-based passwords - Summer2024, January2025, 15March1990. Dates are easily guessed and frequently changed, leading people to use predictable variations (incrementing the year each time a password expires).
The solution: Use this generator to create truly random passwords with no patterns, words, or personal information. Random passwords defeat all dictionary attacks, pattern-based attacks, and targeted guessing.
How to Remember Your Master Password
While all your account passwords should be random and stored in a password manager, you need one master password you can remember to unlock the password manager itself. Here are proven techniques for creating and remembering a strong master password:
Passphrase method: String together 6-8 random words to create a long, memorable passphrase. "correct horse battery staple" is the famous example from XKCD. Use a dice-based word list (Diceware) to ensure true randomness. Example: "elephant-trombone-butterfly-glacier-volcano-crimson" is 48 characters long and memorable with practice.
Sentence method: Create a sentence that is personal and memorable to you, then use the first letter of each word plus punctuation. "My daughter Emma was born in Sydney on the 15th of March 1990!" becomes "MdEwbiSot15oM1990!" - 18 characters with numbers and symbols.
Physical practice: Type your master password 10 times per day for a week. Muscle memory makes typing the password automatic even if you cannot consciously recall all the characters. Write it down and store it in a safe or secure location until you have fully memorised it.
Master password requirements: Your master password should be 25-30 characters minimum, contain no dictionary words (or use 6+ words if using passphrase method), and be unique - never used for any other account. This is the only password that must be both strong AND memorable.
Password Manager Integration Best Practices
Here is the optimal workflow for using this generator with password managers:
Step 1: Generate a password at 20+ characters with all character types enabled. Copy it immediately.
Step 2: During account creation or password reset, paste the generated password into the site's password field. Most password managers will detect this and offer to save it automatically.
Step 3: Ensure the password manager saved both the username and password for the correct website. Many password managers ask you to confirm the URL - verify it matches the actual site domain.
Step 4: Test the saved password by logging out and using the password manager's autofill to log back in. This confirms the password was saved correctly.
Pro tips:
Enable two-factor authentication (2FA) in the password manager itself for additional security. Use biometric unlock (fingerprint, face recognition) on mobile devices to reduce the frequency of typing your master password. Enable breach monitoring to get notified if any of your saved passwords appear in data breaches. Audit your stored passwords quarterly to update old or weak passwords and remove accounts you no longer use.
Common Password Security Mistakes and How to Fix Them
Mistake 1: Using a short password because it is easier to type. You should rarely type passwords manually - password managers autofill them. Prioritise security over typing convenience. Use 20+ characters for all accounts.
Mistake 2: Reusing a password across multiple low-value accounts "because they do not matter." When one of those low-value accounts is breached (and they will be), attackers try the password on high-value targets like email and banking. Every account needs a unique password.
Mistake 3: Sharing passwords via email, SMS, or messaging apps. These are insecure channels - messages can be intercepted or accessed if the recipient's account is compromised. Use a secure password sharing feature built into password managers (1Password, Bitwarden) or a temporary secure link service (like OneTimeSecret) that expires after one viewing.
Mistake 4: Writing passwords in a plain text file or spreadsheet. These files are readable by anyone who gains access to your computer, including malware. If you must keep a password backup outside your password manager, encrypt the file with strong encryption (AES-256) or store it in a physically secure location (safe).
Mistake 5: Using the "Exclude Ambiguous Characters" option unnecessarily. While this makes passwords slightly easier to read, it reduces the character set and therefore the password's entropy. Only enable this if you must type the password frequently by reading it from a printout (rare for most users).
Learn More About Password Security
For more information about password security best practices and cryptographic standards:
- NIST SP 800-63B - Digital Identity Guidelines - Official U.S. government guidelines for authentication and password requirements
- OWASP Password Storage Cheat Sheet - Industry best practices for secure password generation, storage, and handling