79th Unit seal
79th Unit

Password Generator offline

OS cryptographic RNG. Character-class enforced. Clipboard auto-clears in 60s. No third-party resources. No tracking. No storage. Only same-origin fetches for self-hash and signature checks.

Generated

click generate...
Entropy:0 bits
-
NIST SP 800-63B PCI DSS v4 ISO 27001 DoD STIG AES-256 eq.

Random config

24
min
min
min
min
Custom symbol set
Excluded symbols are never used. Useful when the target system rejects certain characters (SharePoint hates ;, MySQL hates ", router UIs hate #, etc.).
Pattern rejection
Rejected candidates are re-rolled automatically. Worst-case 200 attempts before giving up.

Passphrase config (EFF diceware wordlist, 7776 words)

6
6 words ≈ 77 bits • 8 words ≈ 103 bits • 10 words ≈ 129 bits (AES-128 equivalent) • 12 words ≈ 155 bits

Encoded bytes config

32
32 bytes = 256 bits. Useful for API keys, token secrets, TOTP seeds (base32), Bitwarden sends.
Multiple formats from one seed
Same random bytes, encoded every way. Useful when you do not know which format the target system wants, or when you want to print a seed you can recover into any form later.

PIN config (digits only)

6
4 digits ≈ 13 bits • 6 ≈ 20 bits • 10 ≈ 33 bits. PINs are inherently weak. Use only where a real password will not fit (phone unlock, SIM, door code).

Template config

Examples: sk-{32} (OpenAI-style key) • 79U_{16}-{16} (prefixed two-part) • {8}-{8}-{8}-{8} (license-key style). Literal text stays. Only {N} placeholders are filled with secure randomness.

BIP39 seed phrase

Generated per BIP-0039 with SHA-256 checksum. Valid for Bitcoin / Ethereum / Monero / any BIP39-compliant wallet. Restoring this phrase into a wallet gives access to any funds derived from it. Treat like a root key.

TOTP secret generator

Output is a base32 secret + otpauth:// URI. Click the QR button above to show it as a scannable code for Google Authenticator, Microsoft Authenticator, Aegis, 2FAS, etc.

Deterministic (master + site)

Security tradeoff Generates a password deterministically from a master + a site identifier via PBKDF2-SHA256 (250,000 iterations). You can regenerate the same password anywhere without storing it. Counterpart: if your master leaks, every site's password leaks with it. Only use this if you understand that tradeoff. A password manager is generally safer.
Output uses upper + lower + digits + symbols. Changing counter or site produces a completely different password. No data is stored anywhere.

Crack time estimates (average case)

Online (throttled, 100/s)--
Offline CPU (1 B/s)--
Offline GPU farm (1 T/s)--
Nation-state ASIC (1 Q/s)--

Session history (in-memory only, last 10)

no history yet

Batch

Settings

Verified capabilities

CapabilityEvidence
Cryptographic RNG (OS CSPRNG)crypto.getRandomValues, rejection sampling, no modulo bias
NIST SP 800-22 statistical suite9 tests passed at 99.9% confidence (monobit, block-freq, runs, longest-run, serial 2- and 3-tuple, Shannon, serial correlation, ApEn)
BIP-0039 seed phrase compliance20/20 external phrase verification via reference Python implementation
RFC 4648 base32 compliance7/7 canonical test vectors match
RFC 4122 UUID v4 formatVersion bit = 4, variant bit = 8 or 9-b
RFC 6238 TOTP URI formatSpec-compliant otpauth:// with percent-encoded unicode + special chars
SHA-256 implementationMatches "abc" canonical vector ba7816bf...f20015ad
Uniqueness at scale100,000 generations, 0 collisions, 9,119 gens/sec
Weak-password resistance50,000 x 8 weak substrings (password, qwerty, admin, ...), 0 hits
Adversarial fuzz20 payloads (XSS, SQL, path traversal, null bytes, prototype pollution), 0 errors, 0 pollution
Zero client-side storagelocalStorage / sessionStorage / cookies all empty
Zero third-party networkOnly same-origin fetches (self-hash + .sig). CSP blocks everything else
CSP posturedefault-src 'none'; connect-src 'self'; no external scripts / images / iframes / forms
Signed releaseEd25519, fingerprint 00b95edc...796ceb44 (full key in release-key section below)
TLS transport (hosted)Let's Encrypt + HSTS 2y preload + COOP/COEP/CORP same-origin
Full audit report: 12 - Gauntlet/tools/Password Generator - Security Audit.md. Re-run instructions included.

Entropy reference

EntropyClassificationDefeats
< 50 bitsWeakOnline brute force only
50 - 75 bitsOKOnline + modest offline
75 - 100 bitsStrongMost offline attacks
100 - 128 bitsMilitary gradeWell-funded offline attacks (STIG / DoD baseline)
≥ 128 bitsAES-128 equivalentAny classical adversary; matches symmetric cipher strength
≥ 256 bitsPost-quantum hedgeAES-256 equivalent; beyond any practical attack

Scan