You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Readme.md
+29-7Lines changed: 29 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
3
3
> A simple web-based password analyzer that checks if a password is too common or easy to brute-force.
4
4
5
-
## What it does
6
5
6
+
## What it does
7
7
Password_analyser helps you **assess whether a given password is weak or risky**. It checks your password against a list of common passwords and provides feedback when a password is found to be too common or easily guessable.
8
8
9
9
Use Cases:
@@ -12,12 +12,34 @@ Use Cases:
12
12
- Avoid using common / easy-to-guess passwords.
13
13
- Integrate as a local web-tool (localhost) for testing passwords before using them for real accounts.
14
14
15
-
## How it works (brief technical explanation)
16
-
17
-
- The core logic lives in `analyzer.py`, which reads a list of common passwords from `common_passwords.txt`.
18
-
- When you submit a password (via the web interface), the backend checks whether the password matches any in the common list.
19
-
- Optionally, the script could be extended to include more checks (length, complexity, entropy, dictionary-checks, etc.).
20
-
- A minimal web interface (using a web framework) allows you to input a password via GET or POST requests, and receive feedback.
15
+
## How it works (accurate & professional)
16
+
The <b>password analyzer</b> performs a full multi-layer strength evaluation using several checks:
17
+
1.**Length Analysis**
18
+
Ensures the password meets minimum recommended length and flags short or easily guessable passwords.
19
+
2.**Character-Complexity Checks**
20
+
Verifies the presence of:
21
+
Uppercase letters
22
+
Lowercase letters
23
+
Numbers
24
+
Special characters
25
+
And evaluates whether the character distribution is strong or predictable.
26
+
3.**Dictionary & Common-Password Matching**
27
+
Compares the password against a large list of known:
28
+
Common passwords
29
+
Leaked passwords
30
+
Frequently used patterns
31
+
If a match is found, the password is immediately marked as unsafe.
32
+
4.**Pattern Detection**
33
+
Identifies simple sequences such as:
34
+
123456, abcdef, qwerty
35
+
Repeated characters like aaaaaa, 111111
36
+
5.**Overall Strength Scoring**
37
+
All of the above factors are combined to generate a strength evaluation (e.g., Weak, Medium, Strong).
38
+
6.**Localhost Web Interface**
39
+
The tool runs on localhost and exposes endpoints for:
40
+
GET requests → for testing via query parameters
41
+
POST requests → for secure form submission
42
+
The backend returns a structured, human-readable result.
0 commit comments