# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ l๐ŸŽฎ๐Ÿ‘๐Ÿฅ–๐Ÿšฐ๐Ÿš†I๐ŸŒ”๐Ÿฅ–๐Ÿคฒ๐Ÿ‘ˆ๐Ÿฐ๐Ÿฅ“๐Ÿฅฃ๐Ÿ˜–O๐Ÿ‚๐Ÿคฏ๐Ÿ˜ฑR๐Ÿ˜ ๐Ÿš๐Ÿ‘ฐ๐Ÿ›‚r๐Ÿ‘ทB๐Ÿ™‰Q๐Ÿ’ฑ๐Ÿ˜Ÿ๐Ÿฉ๐ŸŽ„๐ŸŽธ๐Ÿฅ๐Ÿ™†E๐ŸŽ๐Ÿ“‘๐ŸŒ๐Ÿคจ๐ŸŒจ๐Ÿ‘š๐Ÿค™๐Ÿ›๐Ÿšฅ๐ŸŒ•๐Ÿคv๐Ÿ’Ÿ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds elf-celibacy-chief-prolonged-unhitched-left # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds obS%;xhGJs>Hg54g|qAs'LV\Jf_%~?pC{^cD4L6FT=PO{&_6jK # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds rrD9TBvKMOP5iQ9rrJrtmTZlh7X6oIvlhm28Gvyw0WmozAOiMf # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿ˜‡๐Ÿ™Ž๐Ÿš‰๐ŸŽ„๐Ÿ ๐Ÿ‘ค๐Ÿ๐Ÿ‘ณ๐Ÿ™๐Ÿค–๐Ÿš˜๐ŸŒช๐Ÿ“ข๐Ÿ๐Ÿ˜‰๐Ÿš…๐Ÿจ๐Ÿ’ฒ๐Ÿก๐Ÿคธ๐Ÿ“ด๐Ÿ’ง๐Ÿต๐Ÿบ๐Ÿ‘•๐Ÿฅ›๐ŸŒซ๐ŸŒค๐ŸŽถ๐ŸŒ˜๐Ÿ‘ฑ๐ŸŽธ๐Ÿšฃ๐Ÿˆ๐Ÿฅข๐Ÿ‘”๐Ÿ˜ท๐Ÿ˜†๐Ÿ“ถ๐Ÿšพ๐Ÿฅ›๐Ÿ’…๐Ÿถ๐Ÿคฉ๐ŸŒธ๐ŸŒฅ๐Ÿฅก๐Ÿ˜›๐Ÿ˜ฅ๐Ÿ€ # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/