Overview

Random Number Generator box

Random Number Generator will let you generate millions of integers and floating point numbers in the desired radix (base), format, and numeric range. Generated random numbers may match any one of the 17 built-in statistical probability distributions. It has various built-in pseudo-random number generators that generate the random bits needed to produce actual numbers.

Random Number Generator is built upon our Password Generator 3.0 and has all of its features. Therefore it also allows you to generate keycodes, serial numbers, passwords, and various other random strings!

What you can do with Random Number Generator

These are just a few things you can do with random Random Number Generator:

  • Generate millions of random numbers in seconds
  • Generate integer and floating point numbers
  • Generate numbers within specified range: from minimum to maximum
  • Generate numbers in a given numeric base (radix): from 2 (binary), decimal, hexadecimal, all the way to base 36
  • Generate negative numbers
  • Control precision and number of decimal places
  • Specify number format
  • Ensure uniqueness and remove duplicate entries
  • Generate numbers within specified continuous probability distribution: Normal / Gaussian, Beta, Chi Square, Student-T, Cauchy, Chi, Uniform, Exponential, Gamma, Laplace, Log-Normal, Pareto
  • Generate numbers within specified discrete probability distribution: Bernoulli, Binomial, Uniform, Geometric, Poisson
  • Use various pseudo-random number generators: FIPS-140 compliant Cryptographically Secure RNG, Mersenne Twister, Additive Lagged Fibonacci, XOR-Shift 128, System Default
  • Generate sequential random numbers
  • Save output to Excel, CSV, XML
  • Export generated numbers to database / update database records
  • Generate serial numbers, pins, codes, and more using masks, i.e. 1AB38-GB7IU-L89R4
  • Generate passwords
  • And much, much more!

How Random Number Generator Works

Step 1

Choose & Customize Building Blocks

Character Groups

  • Lowercase: a b c d e
  • Uppercase: A B C D E
  • Digits: 0 1 2 3 4
  • Symbols: . , ; : /
  • Vowels: a e i o u
  • Consonants: b c d f g
  • Up to 9 user-defined character groups

String Literals

  • 4 built-in text dictionaries
  • Up to 9 user-defined text dictionaries
  • User-defined data-bound dictionaries to use data from databases

Sequences

  • Decimal: 01, 02, 03, …
  • Hexadecimal: …, 9, A, B, …
  • Binary: 00, 01, 10, …
  • Alphanumeric: …, KZ, L0, L1, …
  • User-defined
Step 2

Configure Options & Logic

Character Policies

  • Consecutive: abcdef, 123456, …
  • Keybaord-Consecutive: qwerty, asdfgh, …
  • Duplicate: start, FINISH, …
  • Repeating: password, Hello!, …
  • Similar: 0 o O 1 i I l

Text Transformations

  • Replace, insert, delete
  • Reverse, sort, shuffle
  • Change letter case
  • Morse code, leet speak
  • Change number base (radix)
  • Generate hashes
  • Many others

Filters

  • Common passwords filter: qwerty, 012345, asdfg, password123, …
  • Dictionary-based weak password filter
  • User-defined, custom filters
Step 3

Select Generation Mode & Generation Options

Generation Mode

  • Basic - for simple passwords
  • Advanced - for more complex passwords with more control
  • Number - for generating integer and floating point random numbers within specific range or matching specific distribution
  • Mask - for advanced, template-based code generation based on predefined pattern
  • Pronounceable - for easy to pronounce random strings and made-up generated words

Random Number Generator

  • XOR-Shift 128
  • Mersenne Twister MT-19937
  • Additive Lagged Fibonacci ALF
  • System Default
  • FIPS-Compliant Cryptographically Secure RNG

Generation Options

  • Quantity - up to 100 000 000 (or more if backed up by file)
  • Length
  • Username generation
  • Duplicate checking
  • Hash generation: SHA, MD, CRC, …
Step 4

Generate Passwords, Numbers, Keycodes…

Passwords

  • yc48Na6EC5
  • ак5жй22ГлD45
  • q7_Xp&1o?j5l

Keycodes

  • A15K-003-1Z5XCG
  • +1(800)123-0001
  • sn0300001@svr02

Numbers

  • 386723987
  • -128.09
  • 1F2A300D

Usernames

  • billy64
  • Amy_flower
  • James007@UK
Step 5

Save / Export Output

Excel

Database

XML/HTML

Text/CSV

Encrypted
List

E-Mail

Screenshots Tour

This is a brief screenshots tour of a product. It highlights some of the major product features. For more detailed information on product features, please see video demonstrations and check product features section.

Core Features

Generate millions of passwords

This product lets you generate millions of passwords and usernames in a matter of minutes. The precise speed and the number of passwords that can be generated depend on the available memory and processor speed. We guarantee ability to generate at least 50 000 000 passwords, provided there is enough memory (each password requires 2 × n + 4 bytes of storage, where n is the number of characters in a password, and 2 bytes per character are due to passwords being in Unicode).

Generate Directly to File PRO

The product can generate passwords, directly writing them to a file on disk, completely bypassing User Interface. This will not only result in considerable speed up and save system resources, but will allow you to generate truly large number of passwords, in excess of tens of millions!

5 Generation Modes

The product offers 5 different generation modes, each with different options and functionality. The kind ofrandom numbers / keycodes you want to generate will influence the generation mode you select.

Basic Mode

If all you want is just quickly generate strong passwords, without having to go through many options, Basic Generation Mode is there for you. It lets you specify the length, turn on or off lower case characters, upper case character, numerals, special characters, as well as enable or disable character policies (see below).

Advanced Mode

Advanced mode is similar to Basic Mode, except it has far more options. It allows you to control precisely what characters you want to see in your passwords and what characters you do not want to see appearing. In addition, you can control how often a particular character or group of characters will appear, as well as where (roughly) it will be placed – at the beginning, in the middle, at the end, or somewhere randomly.

Sample case would be: password that contains lower case, upper case, and numeric characters with 10:10:5 ratio, excluding Capital letter B, and it should not start with a number.

Mask Mode PRO

Masking Mode is different from the previous two modes in a number of ways. First and foremost, it gives you complete control over character placement. It can still be random, of course, but you can precisely control the boundaries of this randomness.

In addition, it allows you to use more sophisticated 'building blocks' in your passwords: words or items from external files / databases, and sequential numbers – parts that are automatically incremented with every new password generated.

On top of that, masking mode has several 'operators' that give you even more flexibility. For example, random distribution operator (...) can be used if you want to randomly distribute building blocks (be it characters, words, or sequences) in certain part of the mask.

Pronounceable Mode

Pronounceable Mode makes it super easy to generate passwords that are easy to pronounce. It too has several unique options. For instance, you can enable usage of double vowels and consonants, so that passwords like 'umbrella' would be possible.

Number Mode PRO

Number Generation Mode allows you to generate random numbers (whole, negative, floating point) in mathematical sense of a word. You can specify number range within which the generated numbers should fall. You can also have the generated numbers match a given statistical distribution like Normal, Geometric, or Uniform (there are 17 built-in distributions - both discrete and continuous).

Generate Random Numbers

You can generate random numbers within a specified range or matching a given distribution.

17 Built-in Statistical Distributions

You can generate random numbers that will form a given statistical distribution.

The following continuous distributions are supported: Normal / Gaussian, Beta, Chi Square, Student-T, Cauchy, Chi, Continuous Uniform, Exponential, Gamma, Laplace, Log-Normal, Pareto

The following discrete distributions are supported: Bernoulli, Binomial, Discrete Uniform, Geometric, Poisson

Random Numbers within range

Generate whole or fractional random numbers within specified range. You can set the lower bound to be less than zero to generate negative numbers.

Use different numeric bases (radix)

You can specify the format of the generated random numbers, including its base (radix). You can specify any base between 2 and 36, including binary, octal, decimal, and hexadecimal.

Other formatting options include leading zero character selection, minimum length in digits.

Character Groups

Character Groups are distinct collections of characters grouped together for convenience. They make it easy to control password composition and character placement. For example, if you place a lower case character group placeholder in a mask, you can precisely control where lower case character(s) should appear. What's more is that you can easily remove and add characters from a character group. That way you can exclude unwanted characters with a single click!

There are 4 built-in basic character groups, 4 built-in phonetic character groups, and you can define up to 9 custom character groups - each with arbitrary set of characters, including non-ASCII characters!

Basic Character Groups

There are 4 Basic Character Groups: lower case, upper case, numeric, and special (punctuation and others).

Phonetic Character Groups

There are 4 Phonetic Character Groups: vowels, consonants, double vowels, and double consonants. These character groups are mainly used by the Pronounceable Generation Mode, but you are free to use them in Advanced and Masking Mode as well, though the last two phonetic character groups would be hardly useful in modes other than Pronounceable.

User-Defined Character Groups

You can create up to 9 custom character groups. Each custom character group can contain an arbitrary set of characters, including non-ASCII, Unicode characters. Custom character groups allow you to create groups of characters that make sense to you and help you accomplish your goals.

Advanced Masks PRO

Masks can be thought of as blueprints for the passwords / codes you want to generate. While the masks are used by only 2 generation modes – Advanced and Masking, they are extremely useful.

In Advanced Generation Mode only simple masks are allowed, though you still can accomplish quite a lot with them. For example, (lun)sn is a perfectly valid mask for Advanced Mode. In this case it means that the first part of a password will consist of upper case, lower case, and numeric characters intermixed with each other, followed by special (punctuation and miscellaneous) characters, followed by numeric characters. In the Advanced Mode, the precise number of characters for each character type is determined by the appropriate character's group Density property and the passwords overall length.

In Masking Mode, the masks can be much more sophisticated, as they can contain operators, sequences, words, literals, and even data taken from outside sources. A thing to note is that in the Masking Mode, in contrast with Advanced Mode, a character group placeholder always corresponds to a single character from that group (whereas in Advanced Mode character group placeholder may correspond to more than one character from that group - see above).

Mask / Pattern Resources

Masks, and ultimately the passwords which they correspond to, can be though to consist of distinct building blocks, or resources, and operators that manipulate these resources. There are several kinds of resources that masks can contain:

  • Character Group Placeholders - these will be replaced with actual characters from the appropriate character groups.
  • Dictionary Placeholders - these will be replaced with words or items taken from built in dictionaries, external text files, or even databases.
  • Sequence Placeholders - these represent parts of the password that are supposed to be incremented by a fixed amount with every new password being generated. Sequences can be binary, decimal, hexadecimal, alphanumeric, or of arbitrary base. See sequences feature for more information.
  • Literals - these represent unchangeable pieces of text that you type-in.

This wide variety of building bocks gives you an idea of how flexible the program is.

Mask / Pattern Operators

In addition to resources, masks can have operators that manipulate those resources. Here are some of the masking operators:

  • Random Element Distribution (…) - randomizes the relative placement of all resources within the parentheses, such as individual characters, words, sequences, and literals.
  • Random Character Distribution ((…)) - randomizes the relative placement of all characters within the parentheses, even if it contains composite resources like words, sequences, and literals (thus it destroys words, random numbers, sequences, as the position of all constituent characters is randomized).
  • Random Length {<Char-Group-Placeholder>; <min>, <max>} - takes random characters from the appropriate character group between <min> and <max> number of times.
  • Range [<BaseN>, <Number-Of-Digits>, <min>, <max>] - returns a formatted random number of base <BaseN> with a value between <min> and <max>.
  • Random Placement - a complex operator that allows for scenarios such as if Part A is here, then Part B is there, and PART C is over there, and vice versa (parts here represent submasks, and their number is arbitrary).

But that’s not all – operators can be nested in one another, which gives you truly infinite possibilities.

Use Words & Text Items PRO

You can use words or other textual items in your passwords! These items can be taken from any of the 4 built-in Dictionaries, your own Dictionary (practically an external text file), or even from a Database.

In addition you can control which items are to be taken with various filters, and how they are supposed to be manipulated using letter-case masks, and other tools. And what's more - you can have several such textual items in your password!

  • From built-in "dictionaries" -There are 4 built-in dictionaries (collections of 'words') in the program: Default (nouns, adjectives, verbs), Given Names, Family Names, and Movie Characters - overall totaling at around 90 000 words.
  • From user-defined text files - You can also use words taken from external textual files in your passwords. These external textual files are regarded as user-defined dictionaries by the program, where each line is treated as a word. All the settings that you can apply to built-in dictionaries are applicable for user-defined dictionaries as well. For instance, before a word is inserted, it can be capitalized, first few letters removed, tuned into uppercase, etc.
  • From databases - You can use data from any ODBC-compliant database where source of data is a database, and words are items returned by the SELECT SQL query.

Use Sequences like 009, 00A, 00B... PRO

Sequences are quite far from being random. Essentially they are elements that you can use in masks, whenever you want the codes you are generating to have incrementally adjusted and formatted parts. For example, you may want to generate 10 000 codes, where first 5 characters should be in the form 00001 through 10000, i.e. this part should be incremented by 1 starting from 00001 and formatted with all leading zeros included. Sequences allow for exactly such a thing!

But sequences need not be decimal. They can be binary, hexadecimal, alphanumeric, or in fact of any base up to base 36. In addition, you can specify starting value, increment amount (positive to advance, negative to decrement), maximum and minimum value, and other settings. You can define up to 9 custom sequences.

Also note that sequences are a nice way to make sure that all generated passwords / codes are unique (but there is a special uniqueness setting as well).

Text Transformations PRO

Various built-in transforms can be applied to generated passwords as the last step in the generation process or even to the already generated passwords. Transforms allow you to further fine-tune the passwords being generated, enabling you to add, replace, or remove strings of text; affect the casing or order of characters; convert generated strings to Morse code, Leet Speak, Base-64; generate hashes, and get character codes; and perform other manipulations.

You can apply multiple transforms in a sequential manner. You can also specify exactly which characters in the original string should be affected (you can set the starting and ending characters and / or set RegEx pattern that should match only specific characters). You can specify how the transformed string should be merged with the original: you can set it to overwrite original, overwrite affected characters only, insert before or after the original.

Replace, Insert, Delete Text

There are different transforms that allow you to replace specific characters and text strings in the generated passwords. You can also insert or append new string literals; or even remove certain unwanted strings.

Morse Code Conversion

You can convert applicable characters in the generated strings to their Morse Code equivalents.

Leet Speak Conversion

You can convert applicable characters in the generated strings to their Leet Speak equivalents.

Base-64 Conversion

You can encode generated passwords in base 64.

Characters: Reverse, Shuffle, Change Case...

You can perform various manipulations on individual characters like changing letter case. In addition you can reverse, shift by a certain amount, or randomize the order of characters.

Convert Number Base

Provided that the generated string is a number, you can convert its base (radix) to any other base between 2 and 36.

Compute hashes

You can compute hashes of generated strings in the specified encoding and using specified hashing algorithm: SHA1, SHA2, MD5, RIPE-MD, CRC.

Many Other Transforms

There are many other transformations that you can perform, including getting Unicode character codes, byte codes, performing HTML & URL encode / decode operations.

Character Policies PRO

Character Policies are special options that you can turn on and off (and tweak a little) that make sure certain conditions and requirements are met for the passwords being generated. For example, your policy may be that you allow no more than 2 consecutive characters in your passwords, so that abedgh is allowed, but not abcefg; or maybe you are not allowing repeating characters like the letter s in the word password. In all these cases, character policies help you ensure that all these restrictions are followed.

Consecutive Characters

A Consecutive Character policy, when activated, makes sure that no more than the specified number of consecutive characters appears (1 by default, which means no consecutive characters are allowed).

Consecutive characters are those that appear next to each other and form a sequence. In that regard, there are 2 versions of this policy: one for logical consecutive characters like abc, or 123, and one for keyboard consecutive characters like qwerty.

So for example, the word about will not be allowed, as the letters a and b form a forbidden sequence.

You can also specify whether or not to treat lower case and upper case variants of the same letter as being the same.

Similar Characters

A Similar Character policy, when activated, makes sure that no predefined similar characters can appear in a password at all. This is usually applied to 0 o O 1 i I l characters.

Repeating Characters

A Repeating Character policy, when activated, makes sure that no more than the specified number of repeating characters appears (1 by default, which means no repeating characters are allowed).

So for example, the word password will not be allowed, as the letter s is repeated.

You can also specify whether or not to treat lower case and upper case variants of the same letter as being the same.

Duplicate Characters

A Duplicate Character policy, when activated, makes sure that no more than the specified number of duplicate characters appears (1 by default, which means no duplicate characters are allowed).

This is actually a superset of Repeating Character Policy case; because here we do not allow characters to appear more than the specified number of times regardless of where they are in a password (they need not be next to one another, as in the Repeating Character Policy, for this policy to be triggered). So, if this policy is enabled, then the Repeating Character Policy is practically ignored.

So for example, the word password will not be allowed just as the word suspend, as the letter s appears more than once.

You can also specify whether or not to treat lower case and upper case variants of the same letter as being the same.

Pseudo-Random Number Generators

How does the program generate random passwords? That is where does the randomness come from?

At the core of the generation process is the Random Number Generator (RNG), which creates randomness that the program then uses to make random choices, such as character selection and placement.

The product comes with 5 different internal random number generators that you can choose from. In choosing an RNG there is usually an associated tradeoff between the speed and randomness (which implies security, as more random = better security): the better randomness RNG generates, the slower it is.

The fastest RNG is XOR-Shift 128, which is a xorshift pseudo-random number generator with period 2^128-1. The most secure RNG, and the one which generates the best randomness, is the FIPS-140 compliant Cryptographically Secure RNG. The other 3 RNGs are: Mersenne Twister pseudo-random number generator with period 2^19937-1; Additive Lagged Fibonacci pseudo-random number generator that uses the modulus 232, and by default the 'lags' 418 and 1279; and the one provided by the system.

You can to an extent control RNGs by setting the value for the initial random seed.

Username Generation PRO

You can generate usernames along with passwords, much the same way as you generate passwords. Usernames are generated according to a specified mask. You can then export generated usernames along with passwords to a database, or use them to update existing passwords in a database.

Unicode Support for non-ASCII characters

Your passwords can contain non-ASCII characters, as the program has full support for Unicode. In fact, as you define your own character groups, you can easily add non-ASCII characters into them. In fact, you can generate passwords and usernames with no Latin letters at all, but with say Cyrillic letters. This gives you full flexibility.

Keycode Generation

With such advanced masking capabilities, support for multiple sequences in a single mask, and ability to insert external data from databases into your keycodes, you can easily create all kinds of keycodes for all your needs: be it generating unique lottery ticket numbers, pin codes, serial numbers, or anything else!

Hash Generation - SHA, MD, CRC… SVR

The program lets you generate not just passwords, keycodes, and usernames, but also their hashes, that you can later save or export. The supported hash formats include: SHA-3, SHA-2 (512, 384, and 256 bits), SHA-1 (160 bits), MD-5 (128 bits), RIPE-MD (160 bits), CRC (16 & 32 bits).

User Notification by E-Mail SVR

One of the common tasks of IT security professional is to make sure that personal data of all employees in an organization is safe and secure. Part of this is making sure that all user passwords are strong and are changed on a regular basis.

While changing the passwords may not be so difficult, notifying users about the changes could be a bit of a hassle. This is where program's User Notification Wizard can help. It works by automatically e-mailing users their new passwords, thus saving you a lot of time!

Command-Line Random number Generator SVR

Server Edition of the product, which is available on request, comes with a command-line version of the password generator that offers virtually all features of the main application in a command line format, so that it can be easily automated and scheduled to run on a regular basis.

API - Signed .NET DLL Random number Generator Library

Developer Edition of the product, which is available on request, comes with an API for all password generation features in the form of a signed .NET 2.0+ Compatible DLL library and detailed documentation. If you need to tightly integrate our password generator with your business logic, or want to use its password generation capabilities in your applications, then Developer Edition is for you!

Security Features

Cryptographically Secure FIPS-140 RNG PRO

You can generate FIPS-140 (Federal Information Processing Standard) compliant passwords and keycodes by utilizing program's Cryptographically Secure RNG that generates the best, standards-compliant 'randomness'.

Weak & Custom Password Filters

The program offers the ability to automatically filter-out unwanted weak common passwords, such as 2welcome or a1b2c3d4. This way it makes sure that no such passwords will be present in the list, even if the chance of them being randomly generated is very small. This significantly improves the security.

This Weak Password Filter is implemented by the program comparing every generated password to a predefined list of common passwords. In addition, with the help of Custom Filter, you may create your own lists of words, passwords, and textual items that you want the generated passwords to be checked against.

Duplicate Removal & Unique Random number Generation PRO

The product lets you generate truly unique passwords. That is the program can make sure that all generated passwords will be different.

There are two ways in which this can be accomplished. Number one: the program simply makes sure there are no duplicate passwords as it is generating them. Number two: the program can search for and remove duplicate passwords from the ones already in the list. The latter option is useful if you are generating passwords in several stages, or if you imported some date into the password list.

Data Protection & Encryption SVR

You can save the generated passwords in an encrypted XML file, protecting it with a password of your choice.

Data Features

XML/CSV/HTML/TXT Export

The generated passwords and usernames can be easily exported into XML document, CSV or TXT file, or HTML web page.

Export to Microsoft Excel PRO

The product can export directly to Microsoft Excel by creating a workbook and populating the first sheet with generated passwords (and usernames).

Database Export SVR

The product lets you export generated passwords and/or usernames to any ODBC-compliant database, including SQL Server, MS Access, Oracle, MySQL, etc.

There are 2 modes of export: you can insert new records into the table and columns of your choice or you can update existing records with the values generated by the program.

Use Data from Databases in Passwords

You can use data from any ODBC-compliant database (SQL Server, MS Access, Oracle, PostgreSQL, MySQL, etc.) in your passwords. It works by adding a special kind of user-defined dictionary, where source of data is a database, and words are items returned by the SELECT SQL query that you specify.

Convenience Features

Office-like Ribbon User Interface

UI similar to Microsoft Office with detailed tool tips puts all the important controls at your fingertips, improving ease of use.

Extensive Help & Documentation

The program comes with good built-in and external help. When you start the program, an optional Tip of the Day is shown that provides insight into some of the program's features. Within the program there are numerous tooltips that clearly explain what a particular control does. And of course, there is detailed help that clearly explains all aspects of the program – from concepts such as Character Groups and Masks, to User Interface elements.

Printing Support

The program comes with full printing support, including page setup and print preview.

Complete Clipboard Support

Full clipboard support is included. You can copy and cut various parts of the password list, and then paste them into other places in the same password list, into a different password list, or into a different program altogether - like Microsoft Excel for example.

Getting Started Screen

When you start the program, an optional Getting Started Screen welcomes you and presents you with several common choices of what to do next (generating new passwords, opening existing password lists, etc.), making it easy for you to get started quickly.

Updates

The program continually checks for updates and notifies you when updates are available. This includes updates to password filters, dictionaries, and other resources.

Presets

The product can involve a lot of customization. For example you may want to customize character groups by including or excluding certain characters, or want to customize sequences. In addition, you may want to have several different presets of these customizations. You can do precisely that, as the program lets you easily save all your customizations to a particular area into a separate file that you can reuse later (this is in addition, of course, to the program automatically remembering all settings upon exit).

Easily Accessible Settings & Controls

Most of the settings in the program are accessible through what's called property grids that feature various drop-down controls that make it very easy to tweak different settings.

Search & Replace

The program lets you perform Search and Replace operations within the list of generated passwords and usernames. There is also an option to use Regular Expressions if you want.

Various Options

The program has numerous options that control various aspects of its behavior.

Sorting & Shuffling List Operations

You can perform various list-related operations with a list of generated passwords. You can sort either the whole list or just the selected part, you can shuffle items in the list, or you can copy/move selected items from one list into a different list - all with a click of a button!

Video Demos

See Random Number Generator in action, discover its powerful features, and learn how to use them by watching video demonstrations below!

Note  Some demos showcase our Password Generator 3.0 upon which Random Number Generator is built. However all features shown here are still present in Random Number Generator!

Customization & Extensibility

We can help you integrate Random Number Generator with your existing business logic, extend product's functionality, or otherwise customize it to meet your requirements!

Development Library

Development Library that contains all password generation functionality of this product is available separately for purchase as a COM-Compatible .NET DLL that you can use to leverage Random Number Generator's functionality in your own projects.

Please contact us to get Development Library. We will also be happy to answer any questions you may have regarding licensing, pricing, integration, and other issues.

Let Us Customize Random Number Generator for You!

If Random Number Generator is not exactly what you are looking for, we can customize it for you so it specifically meets your needs! It can be done at a low cost to you, as Random Number Generator provides a solid foundation upon which new features can be effectively added by our experienced developers to quickly create a customized, professional solution that meet your needs!

Keep in mind that contracting us to customize the product will be much cheaper and faster than hiring a programmer or doing the work with your own resources, as we have extensive experience in the area of custom development, and what's more - Random Number Generator is a solid foundation upon which all the extra functionality that you desire can be built. More than 10 000 man-hours and over 100 000 lines of code went into the creation of Random Number Generator, so recreating even part of its functionality from scratch would require lots of resources.

Do you need customization?

  • The product does not exactly meet your needs?
  • Some feature you would like to use is not in the product?
  • Would you like to add another action or operation?
  • Need more options and customizations?
  • Want to integrate the product with your existing business logic?

Custom Development Benefits

  • No programming skills are required - we do everything for you!
  • Low-cost professional development by experienced team
  • Fast development because it leverages existing product and infrastructure
  • Professional User Interface and familiarity as new features are integrated into existing product
  • Royalty-free, flexible licensing model
Request Custom Development Now

Look no further! Contact us to request a quote and start custom development!

Awards & Reviews

Get Random Number Generator Now