# Randomly Generated Passwords # https://pypi.org/project/pwdgen/ ๐Ÿ’ป๐Ÿ™ˆ๐Ÿ˜š1๐Ÿฅ–%๐Ÿช๐Ÿ‘˜๐Ÿ’’E๐Ÿ˜™๐Ÿ™๐Ÿ““๐Ÿšฉ๐ŸŒ—g๐ŸŽซ๐Ÿ“…๐Ÿ˜ผ๐Ÿ˜๐Ÿ˜ƒ๐Ÿ„?๐ŸŒ๐ŸA๐Ÿš๐Ÿ˜ขd๐ŸŒผ๐ŸŽฟ?๐Ÿช๐ŸŒ‡m๐Ÿ‘ช๐Ÿ˜ป๐Ÿ™Ž๐Ÿ•๐Ÿš‡๐ŸŒ’๐Ÿคน๐Ÿ’ฉ๐Ÿซ๐ŸŸ๐Ÿค“๐ŸŠ๐Ÿž๐ŸŒ—๐Ÿ€ # https://passw0rd.me/all/50 # pool size: 804 # possible combinations: 2e+145 # equivalent alphanumeric password length: 81.0 # this password would be compromised by # - a botnet* in: 1e+129 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds stooge-dawn-zoning-starter-untrained-occupy # https://passw0rd.me/eff-passphrase/6 # pool size: 7776 # possible combinations: 2e+23 # equivalent alphanumeric password length: 13.0 # this password would be compromised by # - a botnet* in: 1e+7 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds v0!)anAGms3BZqS;m.]2Lo{5=!cN#mF.hatY5i@y/\gvR~$LSo # https://passw0rd.me/ascii/50 # pool size: 94 # possible combinations: 5e+98 # equivalent alphanumeric password length: 55.0 # this password would be compromised by # - a botnet* in: 3e+82 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ISC4UMgWcxVPGkDZcrBYO4PEppuvJy62bmHqS1LiX1mYw88RRz # https://passw0rd.me/alphanumeric/50 # pool size: 62 # possible combinations: 4e+89 # equivalent alphanumeric password length: 50.0 # this password would be compromised by # - a botnet* in: 3e+73 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds ๐Ÿ๐ŸŽŠ๐Ÿž๐Ÿ‘๐Ÿฅง๐Ÿคญ๐Ÿ’œ๐Ÿš„๐Ÿ’ช๐Ÿ‘พ๐Ÿ“ต๐Ÿš๐Ÿฅ—๐Ÿ˜พ๐Ÿฅ—๐ŸŒ‰๐ŸŽต๐Ÿšธ๐Ÿ†๐Ÿ˜š๐Ÿ‘ƒ๐ŸŽ„๐Ÿ’ฑ๐Ÿ˜ฌ๐Ÿคก๐Ÿ๐Ÿ’ต๐Ÿ›€๐Ÿšด๐Ÿฃ๐Ÿšฎ๐ŸŒ‰๐Ÿšป๐Ÿ’†๐Ÿ„๐Ÿคฒ๐Ÿšป๐Ÿ‘ป๐Ÿ๐Ÿฉ๐Ÿญ๐Ÿ’“๐Ÿฃ๐Ÿ‘๐Ÿšฝ๐ŸŒ๐Ÿผ๐Ÿ˜‰๐Ÿง๐Ÿš• # https://passw0rd.me/emoji/50 # pool size: 710 # possible combinations: 4e+142 # equivalent alphanumeric password length: 79.5 # this password would be compromised by # - a botnet* in: 2e+126 millenia # - being phished: 63 seconds # - being stored in plaintext: 10 milliseconds # - a virus on your device: 10 milliseconds * Assuming 1 trillion MD5 hashes/second. http://dreamersion.com/research-papers/usage-of-botnets-for-high-speed-md5-hash-cracking/