Access my wallet

Password-Only Crypto Wallet

Secure your assets with the power of a convenient password

Hero Desktop Phone

Security and privacy with a Password only wallet

Your password is your account. Cryptographic techniques ensure that it securely generates your private key, granting you instant access to your crypto assets.

This process is one-way and irreversible, verified by industry standards.

No register, No seed phrases

Forget about cumbersome registration processes, emails, 2FA, and KYC. Say goodbye to seed phrases.

Secure your crypto assets with just your password, leaving no footprint and keeping everything stored securely in your mind.

Access my wallet
Access my wallet

A Strong Password = Greater Protection

To ensure maximum security, use a complicated, pseudo-random password.

And do not forget it! This approach makes it nearly impossible to brute force. It could take millions of years to crack.

How it works?

The scrypt and keccak256 hash functions transform your password into a private key.

It fully runs on your browser side and does not transfer your password to other parties.

This method ensures a non-custodial, admin-free, installation-free, setup-free solution with no storage required anywhere.

Learn more

SCRYPT:

N: 32768

r: 8

p: 5

keyLen: 64

Learn more

Transfer holdings in an instant

Share your wallet easily by giving the password to others.

They can access the wallet, making quick transfers possible. Send assets like a gift, effortlessly and securely.

Super easy to use, and very safe!

Password only

Setup your wallet in few clicks with your password and passcode

One-way hash function

Industry standard, verified and secure hash function

Safe

Require millions of years to brute force

Self custodial

Truly own your assets. No signup, no admin, no KYC, no suspend

Do not forget password

No way to recover your wallet

No update password

Different password makes a different wallet

Secure privacy effortlessly

Share your wallet address easily

Multi chain supported

L1, L2 networks like ETH, BSC TRON, Polygon etc

Fully open-source

Verify source code, find security issues and fork by yourself

Audited by

Secure3 is a battlefield where elite auditors compete to safeguard Web3 innovations against security threats.

They have provided security audits for over 140 projects, including zkSync, Polkadot, and more!

View report

FAQs

Password-only crypto wallet lets you create and access your digital wallet using just a password, without the need for seed phrases, site registration, 2FA, or KYC. Only the password determines the private key and wallet address, making it extremely convenient to use for sending and receiving blockchain assets.

By utilizing a password as a single key, it eliminates the need for seed phrases, site registration, or separate private key storage, ensuring user-friendliness without compromising safety. It is self-custodial, decentralized, and hosted on a public domain. No KYC is required, and there are no suspensions of your funds.

You can use this wallet to securely store, transfer, and receive cryptocurrency. It is ideal for both permanent and temporary handling of your crypto. However, it is not intended for interaction with Web3/dApps.

The password is the primary field used to generate a private key and create your account. To avoid password duplication among users, we have also introduced a shorter secondary field called the passcode, which is about 6 characters long. These two fields are combined to generate a private key.

The wallet itself is free to use, but standard blockchain transaction fees will apply. Your generous donations help us continuously enhance and improve our product.

You can't reset or recover the password. Do not lose your password, and back it up.

There is no direct method to change the password. Each password generates a unique wallet. To update your password, create a new wallet with the desired password and transfer your assets to it.

No absolutely! Each password uniquely generates its own corresponding private key and wallet address. The scrypt and keccak256 algorithms transform the password into a 256-bit private key. These two hash functions produce pseudo-random values and are widely verified and accepted across the industry.

Malware can steal passwords by tracking keystrokes. Avoid using personal info like your name or birthday as passwords. There's no admin or database, so your passwords are safe with us.

You can back up private key itself or back up your password as plain text. You can import the private key into other wallet like Metamask.

A simple password is susceptible to brute force attacks, and there is no option to recover or reset the password. Once lost, you will lose your funds permanently.

It does not require personal information, including an email address, and using a one-way hash function means sharing the wallet address does not compromise the private key or password.

It may take a couple of minutes to update your balance in the wallet. Please ensure you have selected the correct blockchain network.

To safeguard your funds, the system locks your account after 15 minutes of inactivity.

Currently, it supports 8 EVM compliant networks including mainnet, BSC, Polygon, Avalanche, etc. Adding Tron, Solana, and the TON network is planned.

Yes, it is fully open source. You can review the codebase here. It is deployed into Github Pages by using Github Actions.

Currently, there is no UI to manage NFTs, but you can still store them in this wallet without any issues.

It is not designed for interaction with Web3/dApps, but you can extract the private key into MetaMask and connect to DeFi apps.

We prioritize transparency. Our codebase, deployment processes, and actions are all managed on GitHub. You can verify the codebase, deployment history, and DNS configuration there.

A password with 94 possible characters (including uppercase and lowercase letters, digits, and special symbols) and a length of 12 would have approximately (94^12) possible combinations. Assuming each brute-force attempt takes less than 1 millisecond with a cutting-edge ASIC attacker, it would take about (5.36 * 10^23) milliseconds, or roughly (1.7 * 10^13) years, to exhaust all possibilities. This duration is extremely long and practically unbreakable by brute force methods.

Storing a full rainbow table for all 12-character passwords with 94 characters each would need about (1.5 * 10^10) petabytes of storage. This shows that creating and storing such a large table is impractical, making longer, complex passwords more secure against these attacks.