Password Generator

Password Generator - Generate a Secure Password

With the EXPERTE.com password generator, you can easily create a highly secure password. The best part? We also check whether any password you input has been leaked in the past. Passwords that have been leaked should never be used again and changed as quickly as possible.

To create awareness for secure passwords, we also provide you with an estimate as to how long it would take a computer to crack the password by means of a brute force attack.

How To Generate a Secure Password

  • When this page is accessed, a random password is generated based on the tool's default settings. This password contains a mixture of 16 lower and upper case letters, numbers, and special characters.
  • Should you have special requirements for the password, you can adjust its length as well as the type of characters used.
  • To copy the password to the clipboard, simply click the button.
  • To generate a new random password, click on the button.

What Makes a Password Secure?

Two factors are decisive when creating a secure password, namely, its length and its uniqueness.

A reliable password should consist of at least 8 characters, but preferably 12 or 16. When using both upper and lower case letters, numbers, and special characters, the time needed to crack a password through a brute force attack increases exponentially. Our password generator estimates how long a modern computer would need to crack the password. Should your settings result in an insecure password or should the password you enter for checking be compromised, our password generator will warn you.

Apart from length, it's essential to not use the same password for every online account. In the past, millions of passwords have been made public owing to data leaks or attacks by hackers. All such passwords can (and are) used by attackers in so-called dictionary attacks. For this reason, our password generator warns you if the password you've entered has been leaked or published in the past.

Frequently Asked Questions

How long should a secure password be?
According to the National Institute of Standards and Technology, a secure password should be at least 8 characters long and use all available types of characters (lower and upper-case letters, numbers, and special characters).

Why should I use a random password?
Data breaches and hacker attacks regularly see login information for millions of users made public, often without the users' knowledge. When you utilize the same password for each service, an attacker can simply use the public data from Website A to log in to Website B. You can prevent this by generating a new random password for each account, compartmentalizing your digital security.

How can I remember a random password?
We recommend the use of a password manager. This tool generates an individual password for each account, however, a password manager is capable of storing all of these passwords, making it necessary for you to only remember one master password.

Data Protection

Since passwords are security-critical data, we take data protection very seriously. The following measures ensure that generating your password with our tool does not pose any additional risk.

Local Generation
We generate the password directly in your browser. The password is not sent to our server and thus, cannot be intercepted.

K-Anonymity Model
To check if your password has been part of a data leak, we query the Have I Been Pwned database. We do not transfer your password to the server but use the k-anonymity model to determine whether your password is contained in the database. To do this, we form an SHA-1 hash of your password but only transmit the first 5 characters of it. The server then responds with about 500 possible matches, which we then check in your browser. Further information about this procedure can be found here.

Other languages:
Deutsch Italiano Français 
More about IT-Security
Cyber Attacks - 3 Current Threats and Countermeasures
HDD and SSD - How to Safely Wipe Your Hard Drive
Phishing: Recognizing the Threat
Data Theft: What Is It? How Can I Protect Myself?
Best Password Manager - 12 Tools Reviewed
How To Remove Junk Files From Your Windows PC
VPN Leak Test - Is Your Private IP Public?
Browser Fingerprinting - What Is It and How Can I Protect Myself?
Best VPN - Review of 22 VPN Providers
Internet Censorship - Site Blocked in China, Russia or Turkey?
Browser Privacy Check - Which Traces Do I Leave on the Web?
Password Checker - How Secure Is My Password?
Darknet - What Is It and How Can I Access It?
Data Breaches - What Is a Data Leak? Have You Been Affected?
Internet Pitfalls - The 7 Biggest Dangers Online
Data Recovery - Restoring Deleted Files
Secure Messengers - The 5 Best Alternatives to WhatsApp
Anonymous Search Engines - 3 Alternatives to Google
Doxing - What It Is and How You Can Protect Yourself
Privacy Browsers: The Best Browsers for Maximum Security
Two-Factor Authentication - This is how you secure your accounts
Ad Blocker - How to Protect Yourself From Annoying Ads
Secure Password - What Makes a Strong Password?
Do Not Track - What It Is and How It Can Protect You
Manage Passwords - Best Way to Store Passwords
Anonymity Online: Tor and the Tor Browser
Identity Theft on The Web – How To Protect Yourself
Best Cloud Backup - 7 Online Backup Providers Reviewed
Best Antivirus Software - 11 Programs Reviewed
How To Change Your IP Address - 3 Simple Ways
Email hacked? How To Find Out if Your Email Has Been Hacked
Anonymous Browsing - How to Surf Anonymously Online
Hide IP - How to Hide My IP Address