zxcvbn-ios
Password analyzer
A password strength estimator for iOS
A realistic password strength estimator.
223 stars
25 watching
67 forks
Language: Objective-C
last commit: over 1 year ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| A password strength estimator based on the Dropbox zxcvbn library | 210 |
| A Go implementation of a realistic password strength estimator inspired by password crackers. | 68 |
| A password strength testing library inspired by Dropbox's JavaScript implementation | 316 |
| Provides a web API to verify password strength on both client and server with consistent results | 20 |
| A PHP library that estimates the strength of passwords based on pattern matching and minimum entropy calculation. | 833 |
| An open-source Java port of a password strength estimator that assesses the security of passwords based on pattern matching and estimation | 324 |
| Provides a set of OCaml bindings to estimate the strength of passwords based on their composition and other characteristics | 15 |
| Provides an Angular.js directive to calculate password strength based on the zxcvbn library and user input from other form fields. | 56 |
| An intelligent password evaluator tool that analyzes entered passwords using algorithms to provide feedback on strength and suggest improvements. | 71 |
| A Java library that estimates password strength based on various algorithms and dictionary matching, providing internationalization support and customizable options. | 293 |
| An implementation of a password strength estimator based on the character frequency in a given language or dictionary. | 82 |
| A native password manager client for iOS and macOS that supports multiple file formats and provides encryption algorithms. | 1,349 |
| An analysis tool for password data that generates statistics and helps users interpret the results. | 634 |
| A password generator tool based on user profiling and statistics | 793 |
| A toolkit for analyzing and improving password cracking operations by identifying common patterns in leaked passwords. | 807 |