Secure Password

GET/password

Generate cryptographically strong passwords with customizable length, character complexity, and comprehensive security analysis including entropy calculations, strength scoring, pattern detection, crack time estimation, and security recommendations for authentication system testing and password policy validation.

Create secure, random passwords with configurable character sets (symbols, numbers, uppercase, lowercase) and detailed security metadata including strength analysis, entropy bits, estimated crack time, pattern detection, and improvement recommendations for testing password policies and authentication workflows.

Request URL
https://api.datamock.dev/v1/password
Parameters
Quantitynumber

Number of passwords to generate (max. 10).

Default : 1

Lengthnumber

Password length in characters (4-48).

Default : 16

Symbolsboolean

Include symbols (!@#$%^&*()_+[]{}|;:,.<>?).

Numbersboolean

Include numbers (0-9).

Uppercaseboolean

Include uppercase letters (A-Z).

Lowercaseboolean

Include lowercase letters (a-z).

Seedstring

Seed for deterministic password generation.

Excludelist

Exclude specific password fields from response.

JSONExport

Response preview will be displayed here.

Use Generate to request the endpoint with the parameters above.
If you have any problem or suggestion with this endpoint, please contact support@datamock.dev
Endpoint Details

Secure Password Generation & Strength Analysis

Generate cryptographically strong passwords with comprehensive security analysis for testing authentication systems, password policies, and security validation workflows. Each password includes detailed strength metrics, entropy calculations, estimated crack times, pattern detection, and actionable security recommendations to help validate password requirements and security policies.

Password Security Features

  • Customizable Character Sets: Configure passwords with symbols (!@#$%), numbers (0-9), uppercase (A-Z), and lowercase (a-z) characters with flexible length from 4 to 48 characters.
  • Strength Analysis: Comprehensive security scoring (Very Weak, Weak, Fair, Good, Strong, Very Strong) based on length, character diversity, and entropy calculations.
  • Entropy Calculation: Accurate entropy measurements in bits reflecting the true randomness and unpredictability of each generated password.
  • Crack Time Estimation: Realistic estimates for brute-force attack duration at various attack speeds (100/sec online, 10K/sec online, 100K/sec offline, 10M/sec offline, 10B/sec advanced offline).
  • Pattern Detection: Identifies common weaknesses like sequential characters, repeated patterns, keyboard walks, and common passwords from breach databases.
  • Security Recommendations: Actionable suggestions for improving password strength with estimated impact of changes.

Authentication Testing Use Cases

  • Testing password strength validators and security policy enforcement
  • Validating password complexity requirements and character set rules
  • Authentication system testing and user registration workflows
  • Password reset and account recovery flow testing
  • Security audit tools and password policy compliance validation
  • Password manager integration and secure storage testing
  • Two-factor authentication (2FA) backup code generation
  • Penetration testing and security assessment tools

Password Security Best Practices

  • Length Matters: Minimum 12 characters recommended, 16+ for high-security applications.
  • Character Diversity: Include uppercase, lowercase, numbers, and symbols for maximum entropy.
  • Avoid Patterns: No predictable words, dates, keyboard walks, or sequential characters.
  • Secure Storage: Hash passwords using Argon2, bcrypt, or scrypt with unique salts.
  • No Reuse: Each service should have a unique password to prevent credential stuffing.
  • Enable 2FA: Two-factor authentication adds critical additional security layer.

Fun Fact

A truly random 12-character password using all character types has approximately 78 bits of entropy and would take a modern computer billions of years to crack through brute force. However, most password breaches occur through phishing, credential stuffing, or database leaks rather than brute-force attacks, making unique passwords for each service critical for security.

Secure Password | Free Mock Data API Generator | DataMock