Why "Advanced"?
Basic password generators spit out a random string of characters. That's fine for simple needs. But this tool goes further, giving you precise control over exactly what goes into your password:
- Minimum counts per category — ensure at least 2 uppercase letters, at least 1 symbol, at least 3 digits, so your password actually meets complex site requirements without retrying repeatedly
- Character exclusions — remove easily confused characters like
0, O, l, 1, I that cause transcription errors when typing passwords manually
- Custom character sets — add or restrict specific symbols if a site has quirky requirements
- Pronounceable mode — alternates between consonants and vowels to generate passwords that are genuinely easier to say aloud when reciting to someone
How Password Strength Actually Works
A password's strength is measured by the effort required to crack it through brute force — trying every possible combination.
The relevant metric is entropy: the number of bits required to describe the uncertainty in your password. More entropy = more possible combinations = harder to crack.
Entropy (bits) = log₂(Alphabet size ^ Password length)
= Password length × log₂(Alphabet size)
| Alphabet | Size | 12-char entropy | 20-char entropy |
|---|
| Digits only (0-9) | 10 | 39.9 bits | 66.4 bits |
| Lowercase only | 26 | 56.4 bits | 94.0 bits |
| Lower + Upper | 52 | 67.9 bits | 113.1 bits |
| Lower + Upper + Digits | 62 | 71.5 bits | 119.1 bits |
| Full printable ASCII (96 chars) | 96 | 78.9 bits | 131.5 bits |
What do these numbers mean in practice?
- < 40 bits: Crackable in seconds with modern hardware
- 40–56 bits: Crackable in hours to days
- 60–80 bits: Would take years on dedicated hardware — fine for most accounts
- 80–100 bits: Practically uncrackable by brute force with current technology
- > 100 bits: Would require astronomical time even with future hardware
For your primary email and financial accounts, aim for 80+ bits. A 16-character password with full mixed character set sits around 104 bits.
Configuration Options Explained
Length
Longer is better, full stop. Each additional character multiplies the total search space by the alphabet size. A 20-character password is not just 4 characters better than a 16-character one — it's 96⁴ = ~85 million times harder to brute-force.
Uppercase letters (A-Z)
Doubling your effective alphabet. Always include unless a rare system doesn't support it.
Digits (0-9)
Adds 10 more possible characters at each position. Nearly every password policy requires at least one digit.
Symbols
The most impactful addition per character. Including !@#$%^&* and similar symbols roughly doubles the alphabet size, adding a full bit of entropy per character. If a site allows symbols, always use them.
Avoid ambiguous characters
Useful when you need to type a password manually or read it over the phone. Removes characters that look alike in many fonts: 0 and O, 1, l, and I.
Minimum counts
Many sites impose password policies manually: "must have at least 1 uppercase, 1 symbol, 1 digit." Without minimum counts, a random generator might technically meet this requirement or might not. Setting minimums guarantees compliance on first try.
Passphrases vs. Passwords
An alternative to complex random strings is passphrases: 4–6 random words strung together. The classic example from security researcher Bruce Schneier:
correct horse battery staple
This has roughly 44 bits of entropy (assuming 2048 common words: log₂(2048⁴) ≈ 44 bits) — comparable to an 8-character complex password, but far easier to remember and type.
Passphrases are best for: accounts you type into regularly and can't use a password manager for — like your password manager's master password itself.
Random character passwords are best for: anything stored in a password manager where you never need to type it manually.
Using Passwords Securely
Generating a strong password is only step one. The way you store and use it matters equally:
Use a password manager. 1Password, Bitwarden, Dashlane, and similar tools store all your unique passwords encrypted, behind one master password. You only need to remember one thing, and every account gets its own unique, strong password.
Never reuse passwords. The most common attack vector today isn't brute force — it's credential stuffing, where leaked passwords from one site are tried on other sites automatically. A unique password per account means one breach doesn't cascade.
Enable two-factor authentication. Even if someone obtains your password, a second factor (app code, hardware key) stops them from logging in.
Change passwords after known breaches. If a site you use announces a data breach, change that password immediately — and any site where you (hopefully not) reused it.