StrengthX

Cybersecurity / AI Tool

StrengthX is a password security intelligence tool that checks whether your password has been exposed in known data breaches via the HaveIBeenPwned API, then leverages a local Ollama LLM to analyze weaknesses and generate a stronger, secure alternative — combining real breach intelligence with AI-powered hardening.

Python Pwned API Ollama API Cybersecurity LLM REST API Password Security
9B+
Breached passwords checked via Pwned API
k-anon
SHA-1 k-Anonymity — password never exposed
LLM
Ollama-powered AI password hardening

Strength Analysis Preview

password123Weak — Breached 2.4M times
Tr0ub4dor&3Medium — Not breached, improvable
AI-Generated Strong PasswordStrong — Safe & AI-hardened
Project Overview

StrengthX bridges real-world breach data with AI analysis to give users actionable, personalized password security recommendations. The tool uses SHA-1 hashing with k-Anonymity to query HaveIBeenPwned without ever sending the full password — preserving user privacy. The local Ollama LLM then dissects structural weaknesses and generates a unique, context-aware strong alternative.

Key Features

Breach Intelligence Check

Queries HaveIBeenPwned's database of over 9 billion compromised passwords using SHA-1 k-Anonymity — password never leaves your device in plaintext.

AI-Powered Analysis

Ollama LLM analyzes entropy, predictability, common patterns, and dictionary risks — returning a detailed breakdown of why your password is weak.

Smart Password Generation

The LLM generates a context-aware strong password based on your current pattern — making it memorable while maximizing security entropy.

Privacy-First Design

k-Anonymity model ensures only the first 5 characters of the SHA-1 hash are sent — mathematically impossible to reverse-engineer the original password.

Instant Results

Real-time feedback within seconds — breach count, strength score, AI explanation, and generated alternative displayed in a single clean output.

Railway Deployment

Deployed on Railway for reliable, low-latency access with auto-scaling and zero-downtime deployments.

How It Works
1

Password Input

User enters their password. The plaintext never gets stored or logged — it's processed only in memory for the duration of the check.

2

SHA-1 Hashing + k-Anonymity

The password is hashed with SHA-1. Only the first 5 characters of the hash are sent to the Pwned API — the full password never travels over the network.

3

Breach Count Lookup

The API returns all hashes matching those 5 characters. The app locally checks if your full hash is among them — and reports how many times it was breached.

4

Ollama LLM Analysis

The password is passed to a local Ollama-hosted LLM which evaluates entropy, patterns, length, and character diversity — generating a structured security report.

5

AI-Generated Alternative

Based on the analysis, the LLM proposes a stronger password — maintaining user-friendly patterns while eliminating all identified vulnerabilities.

Tech Stack
Python
HaveIBeenPwned API
Ollama API
SHA-1 k-Anonymity
REST API
Flask / FastAPI
LLM Integration
Cybersecurity
Railway (Deployment)
Privacy-by-Design