Local Password Breach Checker - Online k‑Anonymity
Tell if your password has appeared in data breaches without sending the full password. Uses hash prefix locally.
UD5 Toolkit
Test your password against industry-standard policies & rules in real-time
Minimum 8 characters, requires 3 of 4 character types.
Length
0Unique Chars
0Entropy
0 bitsChar Types
0/4Estimates assume brute-force attack. Actual times vary based on hashing algorithm and salting.
A strong password is long (12+ characters), uses a mix of character types (uppercase, lowercase, digits, symbols), and avoids predictable patterns like dictionary words, keyboard sequences, or personal info. Our checker evaluates all these factors in real-time.
Entropy measures randomness in bits. Higher entropy = harder to guess. A password with 60+ bits of entropy is considered strong. Entropy depends on length and character pool size. For example, a 12-character password using 70 possible symbols has ~74 bits of entropy.
We calculate the total possible combinations (character_pool^length) and divide by attack speeds. The estimate uses three scenarios: online attack (1,000 guesses/sec), fast GPU (1 billion/sec), and a large cluster (1 trillion/sec). Actual crack times depend on the hashing algorithm used by the service storing your password.
NIST SP 800-63B is a U.S. federal standard for digital identity. Key recommendations: minimum 8 characters, allow all printable ASCII characters including spaces, no mandatory composition rules (no forced special chars), and check passwords against known compromised lists. It prioritizes length over complexity.
PCI DSS (Payment Card Industry Data Security Standard) requires: minimum 7 characters, must contain both letters and numbers, and passwords must be changed every 90 days. Our tool checks the structural requirements but cannot enforce rotation policies.
No. All checks run entirely in your browser using JavaScript. Your password never leaves your device, is not stored, logged, or transmitted. You can disconnect from the internet and the tool will still work perfectly. This is a core privacy principle of our tool.
Attackers use dictionary attacks and pattern-based cracking before brute-forcing. Passwords like "Password123!" or "Summer2024" are cracked instantly despite meeting technical complexity rules. Our checker flags keyboard sequences, repeated characters, and common weak passwords.
Try the passphrase method: combine 4-6 random words like "correct-horse-battery-staple". Add a few numbers and symbols for extra strength. Alternatively, use a password manager to generate and store unique strong passwords for each account. Our built-in generator can create secure passwords instantly.
Tell if your password has appeared in data breaches without sending the full password. Uses hash prefix locally.
Test if a script or style will be allowed by a given CSP. Compute hash/nonce. Strengthen your site’s defense against XSS. Local.
Enter a domain and see its SSL certificate details: issuer, validity dates, and chain. Client‑side fetch.
Validate a DNSSEC chain by entering DS and RRSIG records. Verify that signatures match. Educational. Local algorithm.
Enter a website and check which security headers (HSTS, CSP, X‑Frame‑Options) are present. Get a security grade.
Paste the Permissions‑Policy header and get a human‑readable table of allowed/blocked browser features. Understand how your site is restricted.
Enter a router's MAC address or serial and generate the common default WPA passphrase for major ISP brands. Educational purpose only.
Generate a Contributor Covenant or custom Code of Conduct for your project or event. Ready to paste into your repo.
Display your effective connection type (4g, 3g, etc.) and downlink speed using the Navigator API. Adapt your app accordingly.
Tell the tool what base liquor and mixers you have, and it suggests classic cocktails. Simple database. Cheers!
Convert integers into short, unique, YouTube‑style IDs (hashids) and decode them back. Customize salt and minimum length.
Interpret your blood pressure reading based on American Heart Association and European Society of Cardiology categories. Visual gauge with actionable health insights.
Check if the browser has captured the beforeinstallprompt event. Understand why your PWA is (or isn't) installable.
Check if a password appears in the Have I Been Pwned database using k‑Anonymity. Only the first 5 characters of the hash are sent.
Query a domain's DNS record against multiple public resolvers (Google, Cloudflare) and see how it propagates. Client‑side fetch.
Fetch a site’s HSTS header and validate its syntax, max‑age, and subdomain flags. Ensure your site enforce HTTPS.
Enter an API URL and quickly check its HTTP status code and response time. See response headers and body. Browser fetch.
Type any character and see how it renders in different font stacks. Detect missing glyphs and fallback behavior.
Enter a palette of colors and see a grid showing whether each foreground/background pair passes AA or AAA contrast. Must for designers.
Enter a URL and get a one‑page report of titles, description, headings, image alts, and broken links. All from browser.
Look at HTTP headers and JavaScript objects to guess which browser extensions might be installed. For awareness.
Enter a package name and version range to see all satisfying versions from the registry. Understand ^ and ~.
Check if an IBAN has the correct length and structure for its country. Early validation, no bank connection.
Drop an image that might have wrong extension and see its real format (JPEG, PNG, WebP) based on header bytes.
Enter a URL and see its favicon at all standard sizes. Check if it's properly defined. SEO basic check.
Check if a number of the form 2^p‑1 is a Mersenne prime. Quick Lucas‑Lehmer test simulation for small p.
Trace the full redirect path of a URL. See every hop, status code, and final destination. Detect broken chains.
Paste your email body and subject, and get a spam score based on common trigger words and patterns. Improve your cold outreach.
Type a word to see all its homophones with definitions. Avoid embarrassing mistakes (their/there/they’re). Static dictionary.
Classic solubility rules for ionic compounds in water. Determine if a salt is soluble or forms a precipitate. Static guide.