# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐ŸŒ•๐Ÿ“ต๐ŸšZ๐Ÿ’Ž๐ŸŽฏg๐ŸŽก๐ŸŽต๐Ÿ˜ฃQ๐ŸŽฑ๐ŸŽžj๐Ÿ˜œ๐Ÿ“ช๐ŸŒ‡๐Ÿ‰k๐ŸŽฒ๐Ÿ‘ฏ๐Ÿฒ๐Ÿฅจ๐Ÿšธ๐Ÿ‘ฃ๐Ÿ’จ๐Ÿ˜™๐Ÿ—๐Ÿ‘š๐Ÿ˜ฌ๐ŸŠ~๐Ÿ‘ท๐Ÿฝ๐Ÿฅญ๐ŸŽ `๐ŸŒ ๐Ÿฅ๐ŸŽ‡๐Ÿ˜˜๐Ÿคซ๐Ÿฌ๐Ÿ’ [๐Ÿฅ“๐ŸŸe๐Ÿฅ๐Ÿ“˜ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds neon-outbid-reliant-departure-engorge-extenuate # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds $3{|o0`}d<,*Lt;:j0*=-Dk0Nlv4BFFf+AW)Y(,uN+#qPlNus_ # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds cUNcnMeEBFibbHPYARMDy9CvzFJPAhwdqjNOEjzVjw3VpnRJiN # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐ŸŽง๐Ÿš๐ŸŒฏ๐Ÿฅ˜๐Ÿš€๐Ÿคถ๐Ÿƒ๐Ÿ˜๐Ÿ‘๐ŸŒฆ๐Ÿ•๐Ÿ‘‹๐ŸŽฎ๐ŸŠ๐ŸŽ๐ŸŒ„๐Ÿ…๐Ÿ˜ซ๐ŸŒช๐Ÿคง๐Ÿ’‹๐Ÿฅ๐Ÿš๐Ÿ˜ท๐Ÿšผ๐Ÿƒ๐Ÿ“Ÿ๐Ÿ“Ÿ๐Ÿ‘ด๐Ÿ“ซ๐Ÿ€๐Ÿ‹๐Ÿ’ณ๐Ÿ“ก๐ŸŒš๐ŸŒฝ๐Ÿคจ๐Ÿš’๐Ÿšด๐Ÿš€๐ŸŽน๐Ÿ’Ÿ๐Ÿš๐Ÿฅฅ๐Ÿ‘•๐Ÿšฝ๐Ÿ›๐Ÿฅ๐Ÿ™‚๐Ÿฅฌ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/