PASSWORD GENERATOR

Generate strong, random passwords and PIN codes instantly. Uses cryptographic randomness. 100% client-side — nothing is ever transmitted or stored.

Rate this tool
Mode
Length 16
Character Sets

Strength Assessment

Generate a password to see strength

Entropy: — bits

Tick the box above to enable the generator.

Password Strength by Length

LengthStrengthEntropy
8 chars Dangerous ~53 bits
12 chars Fair ~79 bits
16 chars Strong ✓ ~105 bits
20 chars Fortified ~131 bits
32 chars Uncrackable ~210 bits

Calculated using a 95-character pool (all printable ASCII). Entropy = length × log₂(95).

The Mathematics of Password Security

A brute-force attack works by systematically trying every possible combination of characters until the correct password is found. Modern graphics cards can test billions of combinations per second — which is why password length matters so much more than memorability.

How this generator works

FindBeam uses window.crypto.getRandomValues() — the Web Crypto API built into every modern browser. This is the same cryptographic randomness source used by your operating system and is considered cryptographically secure. The generated password never leaves your browser tab.

Password Entropy Explained

Entropy measures unpredictability in bits. The formula is: entropy = length × log₂(pool size). Using all 95 printable ASCII characters gives approximately 6.57 bits per character. At 80+ bits of entropy, passwords are considered infeasible to brute-force with current hardware. At 100+ bits, they remain secure against future computing advances for the foreseeable future.

The time to crack scales exponentially with entropy — adding just one character to your password doesn't add a little time, it multiplies the attack time by the size of the character pool.

Password Security Best Practices

Use a Password Manager

A password manager stores all your generated passwords securely behind a single master password. You only need to remember one strong passphrase. Bitwarden (free, open-source), 1Password, and Dashlane are the most trusted options.

Never Reuse Passwords

When a service is breached, attackers test stolen passwords on every other major site (credential stuffing). A unique password for every account means a breach on one site cannot cascade to others. Generate a new password for each account.

Enable Two-Factor Auth

A strong password plus two-factor authentication (2FA) is significantly more secure than either alone. Even if your password is stolen in a breach, an attacker still needs physical access to your 2FA device. Use an authenticator app like Google Authenticator or Authy rather than SMS.

Check for Breaches

Use HaveIBeenPwned.com to check if your email address has appeared in any known data breaches. If it has, change those passwords immediately. Many password managers also check this automatically on your behalf.

PIN Codes — Why They Show "Weak"

Why does the meter show "Weak" for PINs?

PINs only use 10 digits (0–9). The entropy formula is: length × log₂(10) ≈ length × 3.32 bits. A 12-digit PIN has only ~40 bits of entropy — genuinely Weak by cryptographic standards. The strength meter is mathematically correct. What makes PINs safe in practice is the lockout policy, not entropy — explained below.

PIN codes use only the 10 digits (0–9), so their raw entropy is always much lower than an equivalent password. A short PIN can be guessed just by watching over your shoulder. The numbers below show the total possible combinations — this is what the lockout policy protects.

10,000

4-Digit PIN

~13 bits — guessable without lockout

1,000,000

6-Digit PIN

~20 bits — safe only with lockout

100,000,000

8-Digit PIN ✓

~27 bits — recommended minimum

10 billion+

10-Digit PIN

~33 bits — strong for a PIN

Most banking systems and device lock screens apply a lockout policy — the device locks or the account suspends after 3–10 failed attempts. This makes even a 4-digit PIN reasonably secure in practice because an attacker cannot try all 10,000 combinations — they get only a handful of attempts. The entropy meter correctly reflects the raw mathematical strength. Choose 8 digits minimum for any PIN where lockout might not apply, such as encrypted archives or offline systems.

Frequently Asked Questions

Is this password generator safe?
Yes. All passwords are generated in your browser using window.crypto.getRandomValues() — the Web Crypto API, which provides cryptographic-quality randomness. No password is ever transmitted to FindBeam's servers or any third party. You can verify this by switching to airplane mode — the generator still works.
How long should my password be?
Security experts recommend at least 12–16 characters for general accounts and 20+ characters for high-value accounts such as your email, banking, and password manager. A 16-character password from all character sets has over 100 bits of entropy — effectively uncrackable by any current or near-future technology.
What is password entropy?
Entropy measures how unpredictable a password is, expressed in bits. Formula: entropy = length × log₂(pool size). Using all 95 printable ASCII characters gives ~6.57 bits per character. At 80+ bits, a password is infeasible to brute-force with current hardware. Each additional character multiplies the attack time by the pool size.
What are ambiguous characters?
Ambiguous characters are visually similar pairs: uppercase I and lowercase l and the digit 1, or uppercase O and zero 0. When typing a password manually — on a TV, tablet, or from a printed sheet — these look identical and cause login failures. Filtering them out removes only a few characters from the pool and has a negligible effect on entropy.
Should I use the same password on multiple sites?
Never. When one service is breached, attackers immediately try the stolen password on Gmail, banking sites, and social media (credential stuffing). If you reuse passwords, one breach becomes many. Use a unique password for every account and store them in a password manager.
What is the difference between a password and a PIN?
A password uses letters, numbers, and symbols giving high entropy per character. A PIN uses only digits (0–9), so entropy is always low — the tool correctly shows PINs as Weak or Dangerous by raw entropy. What makes PINs safe in practice is the lockout policy: banking systems and device locks suspend the account after 3–10 wrong attempts, making brute-force impractical regardless of entropy. Use PIN mode for digit-only codes where a lockout is enforced. For offline systems with no lockout, use a password instead.
Is this tool free?
Yes. FindBeam's Password Generator is completely free with no account, no registration, and no usage limits. It will remain free.