This tool is designed for educational purposes to help you understand password security and create stronger passwords.
Prohibited Uses:
- Accessing any computer system, account, or data without authorization
- Attempting to crack passwords that don't belong to you
- Using this information to harm others or their systems
- Violating applicable laws including the Computer Fraud and Abuse Act (CFAA)
Acceptable Uses:
- Testing your own passwords
- Learning about information security
- Authorized security research
- Educational purposes
Important Limitations & Assumptions:
- These estimates assume pure brute-force attacks without any optimizations
- Real-world attacks may use rainbow tables, GPU clusters, or quantum computers
- Dictionary mode is a simplified model; actual dictionary attacks vary greatly
- Attack speeds depend on many factors: hardware, algorithm implementation, network conditions
- These calculations don't account for rate limiting, account lockouts, or other defenses