Skip to content

Commit 2fb73ee

Browse files
committed
Readme
1 parent 0cb3e98 commit 2fb73ee

File tree

1 file changed

+29
-7
lines changed

1 file changed

+29
-7
lines changed

Readme.md

Lines changed: 29 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22

33
> A simple web-based password analyzer that checks if a password is too common or easy to brute-force.
44
5-
## What it does
65

6+
## What it does
77
Password_analyser helps you **assess whether a given password is weak or risky**. It checks your password against a list of common passwords and provides feedback when a password is found to be too common or easily guessable.
88

99
Use Cases:
@@ -12,12 +12,34 @@ Use Cases:
1212
- Avoid using common / easy-to-guess passwords.
1313
- Integrate as a local web-tool (localhost) for testing passwords before using them for real accounts.
1414

15-
## How it works (brief technical explanation)
16-
17-
- The core logic lives in `analyzer.py`, which reads a list of common passwords from `common_passwords.txt`.
18-
- When you submit a password (via the web interface), the backend checks whether the password matches any in the common list.
19-
- Optionally, the script could be extended to include more checks (length, complexity, entropy, dictionary-checks, etc.).
20-
- A minimal web interface (using a web framework) allows you to input a password via GET or POST requests, and receive feedback.
15+
## How it works (accurate & professional)
16+
The <b>password analyzer</b> performs a full multi-layer strength evaluation using several checks:
17+
1. **Length Analysis**
18+
Ensures the password meets minimum recommended length and flags short or easily guessable passwords.
19+
2. **Character-Complexity Checks**
20+
Verifies the presence of:
21+
Uppercase letters
22+
Lowercase letters
23+
Numbers
24+
Special characters
25+
And evaluates whether the character distribution is strong or predictable.
26+
3. **Dictionary & Common-Password Matching**
27+
Compares the password against a large list of known:
28+
Common passwords
29+
Leaked passwords
30+
Frequently used patterns
31+
If a match is found, the password is immediately marked as unsafe.
32+
4. **Pattern Detection**
33+
Identifies simple sequences such as:
34+
123456, abcdef, qwerty
35+
Repeated characters like aaaaaa, 111111
36+
5. **Overall Strength Scoring**
37+
All of the above factors are combined to generate a strength evaluation (e.g., Weak, Medium, Strong).
38+
6. **Localhost Web Interface**
39+
The tool runs on localhost and exposes endpoints for:
40+
GET requests → for testing via query parameters
41+
POST requests → for secure form submission
42+
The backend returns a structured, human-readable result.
2143

2244
## Project structure
2345

0 commit comments

Comments
 (0)