What this strength checker does
Type a password to see a quick health report: a 0–100 score mapped to tiers from Very Weak to Very Strong, a checklist of common policy items (at least 8 and optionally 12 characters, uppercase, lowercase, digit, symbol, absence of trivial keyboard patterns, and not matching a small built-in list of famously weak passwords), and a short suggestion list for anything that failed. A separate line estimates how long an idealized offline brute-force attacker might need if they could try about one billion random guesses per second against your character set — that number is educational only.
How the score is computed
Points are awarded for length bands, each character class present, and for avoiding the weak list and a regular-expression test for substrings like 123, abc, qwe, password, or asdf. The total is capped at 100 and drives both the tier label and the progress bar color. This is a heuristic model, not machine learning and not a breach-database lookup.
Crack time estimate
The tool guesses an alphabet size from what character classes appear (lowercase, uppercase, digits, symbols with a fixed symbol-size assumption), raises that to the power of the password length, and divides by 1e9 attempts per second to produce a human-readable duration. Real attackers use dictionaries, rules, GPU clusters, and stolen hashes — treat the estimate as an order-of-magnitude illustration, not a guarantee.
Privacy
Analysis runs entirely in your browser tab. Your password is not transmitted to Dynamic Duniya. Avoid typing real production secrets on shared or recorded screens even when processing is local.