SILA Entropy is a high-fidelity password auditing suite designed for the Ministry of Interior. It utilizes multi-model estimation, Khmer linguistic threat analysis, and k-anonymity breach detection to provide a 2026-standard security verdict.
- Breach Intelligence: Real-time
$k$ -anonymity interrogation via the Have I Been Pwned API. - Multi-Model Estimation: * Brute-Force: Mathematical entropy vs. State-level GPU clusters (
$10^{11}$ guesses/sec). - Pattern-Aware: Detection of "human habits" (trailing digits, leetspeak).
- Guessability: Deep analysis via zxcvbn with pattern_fallback.
- Localized Threat Model: Specialized Khmer dictionary integration to detect regional password patterns.
- NIST 2026 Ready: Built-in compliance checking for the 15-character security floor.
- Confidence Bands: Best, Expected, and Worst-case "Time-to-Entry" (ETE) scenarios.
- Strength tiers:
Very Weak,Weak,Moderate,Strong - Breach status via Have I Been Pwned (Pwned Passwords API)
- Multi-model estimation:
- random brute-force model
- pattern-aware model
- guessability model (
zxcvbnif available, fallback otherwise)
- Conservative estimate uses the fastest plausible crack path
- All-scenario mode tests all combinations of hash profile, attacker scale, and online defense profile
- Confidence bands: best / expected / worst
- Python 3.9+
- Packages:
requestsrichzxcvbn(optional but recommended)
pip install requests rich zxcvbnIf zxcvbn is not installed, the app automatically uses pattern_fallback.
python sila.pyThe app will:
- Print active guessability engine (
zxcvbnorpattern_fallback) - Test all configured scenario combinations
- Ask for comma-separated target passwords
- Show a concise results table
- Show a detailed explanation panel for the first target
COMMON_PASSWORDS now loads from wordlists/rockyou.txt.
- Place your wordlist at:
wordlists/rockyou.txt
- Keep it out of git:
.gitignorealready excludeswordlists/rockyou.txt
- Tune load size in
sila_config.py:ROCKYOU_MAX_WORDS = 1_000_000max_words = None(full file load).
- If missing, SILA falls back to a built-in minimal password set.
COMMON_WORDS loads from:
wordlists/common_words.txt
Edit sila_config.py for:
NIST_MIN_LENGTHHASH_PROFILESATTACKER_SCALEONLINE_DEFENSEROCKYOU_MAX_WORDS
python -m unittest -v- This tool estimates password strength/risk; it cannot provide exact crack-time guarantees.
- Real-world security still depends on operational controls such as MFA, lockout/rate limiting, secure hashing parameters, and monitoring.
This tool is designed for security evaluation and auditing purposes only. While SILA provides high-accuracy estimations, real-world security requires a defense-in-depth approach including MFA (FIDO2/Passkeys), rate-limiting, and continuous monitoring.