Add password iteration (PBKDF2) count input text box (accept like “310000”), and output adjustment to “time to crack”.
Augment this page:
Take this superficially seemingly OK password, 9W&%r24v. Turns out it is “weak”, with a zxcvbn “time to crack” of 3 hours. Not great. But if that is hashed with 310,000 iterations, maybe we’d get 1000s of years of “protection”?