passwordcreator.org
Open in
urlscan Pro
2600:1f1c:cc9:a401:ba4e:ce1d:f5d5:d720
Public Scan
Submitted URL: http://passwordcreator.org/
Effective URL: https://passwordcreator.org/
Submission: On November 01 via manual from GB — Scanned from GB
Effective URL: https://passwordcreator.org/
Submission: On November 01 via manual from GB — Scanned from GB
Form analysis
1 forms found in the DOM<form id="optionsform"> Security level: <select id="securitylevel">
<option value="poor">Poor</option>
<option value="subpar">Subpar</option>
<option value="good" selected="selected">Good</option>
<option value="great">Great</option>
<option value="amazing">Amazing</option>
<option value="overkill">Overkill</option>
</select>
<button id="passnew" type="button">Create new passwords</button>
</form>
Text Content
RANDOM PASSWORD GENERATOR RANDOM * y6]p#c`'P% * 3(H_RV$~d4 * <ZmTdwf-|d * N;p``1?';B * h&-e5d&d{} * |QNn0N#|Af * -!v=(?s\p$ * CwFgA<{]%0 * \!9^tH{%SB * Qc~|aH/'>j Out of 59.9 quintillion possibilities WRITABLE * jL7YDnd2ZHGD * YJAr5ieeYDn6 * ZTnMEy2pN6xW * tJ7ebtRbdg2A * 6dT9ng2FDNam * gCFmKCMGXhQC * L5p4B9JZmcWN * ygRL2JzpQkwX * QmbHk57KmkTa * CKJ32icGrBLx Out of 244 quintillion possibilities SHIFTLESS * 6.pyp4mcr,z. * z0e.,30ex2/i * 4a4,79f/m-'p * 2a1in'4=z-k2 * laaugnu1g,71 * 1z.\,fe`/,gh * 3tf0,t\cu/32 * 3i qjgq1940q * 5t8jnztc-3=, * kw=1;u .lm0/ Out of 150 quintillion possibilities FAKE WORD * cutlooredgackumpulp * yierommitabloinflipt * cryptigeotindudgexceed * oistocomplecoubbime * jackappierraimpercerds * ubbilduptutuangrible * thiggimsepliedrorcims * moundissuettemmemptiera * grashlescatiornappoicy * spoudiemuproadmashank Out of 316 quintillion possibilities COMMON WORDS * ledge oddly ladle jet prim * decade undated dread sales liaison * waned lug ground entails priory * chances peep bottled whether dialog * signal tapered luis chive leather * squat mulch utilize spreads other * james long suspend clock remix * enact drawing spines much ninety * odds moored prices reborn bars * jog gusty fatally quiz mile Out of 90.7 quintillion possibilities No passwords were generated because your browser does not support JavaScript, or it is not enabled. Security level: Poor Subpar Good Great Amazing Overkill Create new passwords * These secure passwords were created just for you and are unique. * The script that generates these passwords runs in your own web browser on your own computer. You can generate strong passwords either online or offline. * These passwords never traveled over the internet during their creation. * The web server that serves this page never sees these passwords. * A cryptographically secure random number generator was used to create these passwords. * Your browser does not support cryptographically secure random number generation. It is possible that somebody could guess these passwords if they knew the precise millisecond that you used this page. * This page was served securely over HTTPS. This ensures that it is genuine and was not altered in transit. * This page was served over an insecure connection. It could have be forged or altered in transit. It is available securely over HTTPS: https://passwordcreator.org/ * Nothing was generated because your browser's user agent says that it is a bot. This prevents random text from being indexed in search engines. -------------------------------------------------------------------------------- SUGGEST RANDOM PASSWORDS ON YOUR WEBSITE PasswordCreator.org can power a list of secure randomly generated passwords on your website. Put a list of suggested passwords on your website near where you ask your users to choose a password. Security level: Poor Subpar Good Great Amazing Overkill Preview SUGGESTED PASSWORDS: GET THE CODE: -------------------------------------------------------------------------------- xkcd comic: Password Strength This is why you should use random words for passwords. "Tr0b4dor&3": easy to guess and hard to remember. "correct horse battery staple": difficult to guess and you've already memorized it. -------------------------------------------------------------------------------- Lifehacker: Which password manager is the most secure Examines the following techniques for storing passwords: * Saving Logins in Your Browser * Web-Based Password Managers * Local (Desktop) Managers It concludes that local desktop managers are the most secure and has a comparison chart of various online and desktop password managers. -------------------------------------------------------------------------------- Diceware Arnold G. Reinhold published a word list and method of rolling dice to look up words to make random passwords. The passwords generated by Diceware end up being very similar to the common words passwords here. When using physical dice, you don't need to rely on the security of your computer or the trustworthiness of the software that generates passwords. If you like the word list used by Diceware, you can use it to generate passwords here on passwordcreator.org. -------------------------------------------------------------------------------- Computerphile video Watch a researcher use a powerful computer with four graphic cards to crack passwords. -------------------------------------------------------------------------------- Ars Technica: How the Bible and YouTube are fueling the next frontier of password cracking An eye popping account of just how many passwords are easy to crack. * 60 percent encrypted passwords from a security breach could be cracked with off the shelf tools. * All passwords of eight or fewer characters are vulnerable to offline attack with the computing power available today. * Hackers can easily crack longer passwords that are based on words and phrases. * Hackers use word lists with close to a billion entries and can try variations on those. * Mangling words and phrases with capitals, numbers, and punctuation offers little protection. -------------------------------------------------------------------------------- Naked security: 55% of net users use the same password for most, if not all, websites. When will they learn? "Why does this matter? Well, imagine you are a member of websites X, Y and Z - and you use the same password on each site. If X suffers from a data leak and their password database is accessed, or if hackers manage to work out your password for X, then the bad guys will not only have access to your X account, but Y and Z as well!" -------------------------------------------------------------------------------- ICT.govt.nz: The Factors of Authentication The three factors of authentication are: 1. Something you know (for example a password) 2. Something you have (for example a government issued passport) 3. Something you are (for exmple a fingerprint) Passwords are the default level of security on the web. They are however, only one portion of very secure three factor authentication. -------------------------------------------------------------------------------- Google Official Blog: Advanced sign-in security for your Google account How and why to enable 2-step verification on your Google account so that an attacker doesn't have to know just your password, but also has to have your mobile phone. -------------------------------------------------------------------------------- Wikipedia: Single sign-on Single sign on is a method of using credentials from a single website to log into many websites. Single reduces the number of passwords needed and can increase security: * Reducing password fatigue from different user name and password combinations * Reducing time spent re-entering passwords for the same identity -------------------------------------------------------------------------------- Lockdown.co.uk: Password Recovery Speeds Shows how much time it would take to recover encrypted passwords in various situations and attack senarios. -------------------------------------------------------------------------------- HOW SECURE IS YOUR PASSWORD RANDOM 95 possible letters, numbers, and symbolsAverage time to crack based on number of guesses per second SizePossible combinations1 trillion (expected future capability)100 billion (large distributed system)1 billion (distributed system or supercomputer)100 million (small distributed system)1 million (single computer) 57.74 billioninstantinstant4 seconds39 seconds1 hour6735 billioninstant4 seconds6 minutes1 hour4 days769.8 trillion3 seconds6 minutes10 hours4 days1 year86.63 quadrillion6 minutes9 hours1 month1 year1 century9630 quadrillion9 hours1 month10 years1 century100 centuries1059.9 quintillion1 month9 years9 centuries95 centuries-115.69 sextillion9 years9 centuries902 centuries--12540 sextillion9 centuries857 centuries---1351.3 septillion814 centuries----144.88 octillion----- WRITABLE 50 possible letters, and numbersAverage time to crack based on number of guesses per second SizePossible combinations1 trillion (expected future capability)100 billion (large distributed system)1 billion (distributed system or supercomputer)100 million (small distributed system)1 million (single computer) 615.6 billioninstantinstant8 seconds1 minute2 hours7781 billioninstant4 seconds7 minutes1 hour5 days839.1 trillion2 seconds3 minutes5 hours2 days8 months91.95 quadrillion2 minutes3 hours11 days4 months31 years1097.7 quadrillion1 hour6 days2 years15 years15 centuries114.88 quintillion3 days9 months77 years8 centuries774 centuries12244 quintillion5 months39 years39 centuries387 centuries-1312.2 sextillion19 years19 centuries---14610 sextillion10 centuries968 centuries---1530.5 septillion484 centuries----161.53 octillion----- SHIFTLESS 48 possible letters, numbers, and symbolsAverage time to crack based on number of guesses per second SizePossible combinations1 trillion (expected future capability)100 billion (large distributed system)1 billion (distributed system or supercomputer)100 million (small distributed system)1 million (single computer) 612.2 billioninstantinstant6 seconds1 minute2 hours7587 billioninstant3 seconds5 minutes49 minutes3 days828.2 trillion1 second2 minutes4 hours2 days5 months91.35 quadrillion1 minute2 hours8 days3 months21 years1064.9 quadrillion54 minutes4 days1 year10 years10 centuries113.12 quintillion2 days6 months49 years5 centuries494 centuries12150 quintillion3 months24 years24 centuries237 centuries-137.18 sextillion11 years11 centuries---14345 sextillion5 centuries546 centuries---1516.5 septillion262 centuries----16794 septillion----- FAKE WORD Recombined syllables in the common wordsAverage time to crack based on number of guesses per second SizePossible combinations1 trillion (expected future capability)100 billion (large distributed system)1 billion (distributed system or supercomputer)100 million (small distributed system)1 million (single computer) 322.2 billioninstantinstant11 seconds2 minutes3 hours47.66 trillioninstant38 seconds1 hour11 hours1 month52.65 quadrillion2 minutes4 hours15 days5 months42 years6914 quadrillion13 hours2 months14 years1 century145 centuries7316 quintillion6 months50 years50 centuries501 centuries-8109 sextillion2 centuries173 centuries---937.7 septillion597 centuries----1013 octillion----- COMMON WORDS 9806 possible wordsAverage time to crack based on number of guesses per second SizePossible combinations1 trillion (expected future capability)100 billion (large distributed system)1 billion (distributed system or supercomputer)100 million (small distributed system)1 million (single computer) 296.2 millioninstantinstantinstantinstant48 seconds3943 billioninstant5 seconds8 minutes1 hour5 days49.25 quadrillion8 minutes13 hours2 months1 year1 century590.7 quintillion2 months14 years14 centuries144 centuries-6889 sextillion14 centuries----78.72 octillion----- Passwords: Standard | Diceware | Random Mix | Writable | Shiftless | Fake Word | Common Words Password languages: Dutch | French | English | German | Spanish Random text: Story | Lorum ipsum | Names Copyright 2013-2020 Stephen Ostermiller | Like on Facebook | About | Privacy policy This password generator is provided in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.