Effective method to regain access to a password-protected Excel sheet using a simple VBA macro. Learn the PasswordBreaker code.
EN

How to remove Excel sheet password?

5.00 /5 - (33 votes )
Last verified: May 1, 2026
2min read
Guide

To remove a password from a sheet, basically open the macro editor in Excel (Alt+F11), insert a new module, and paste the code below:

Excel Password Breaker Illustration

Sub PasswordBreaker()
    Dim i As Integer, j As Integer, k As Integer
    Dim l As Integer, m As Integer, n As Integer
    Dim i1 As Integer, i2 As Integer, i3 As Integer
    Dim i4 As Integer, i5 As Integer, i6 As Integer
    On Error Resume Next
    For i = 65 To 66: For j = 65 To 66: For k = 65 To 66
    For l = 65 To 66: For m = 65 To 66: For i1 = 65 To 66
    For i2 = 65 To 66: For i3 = 65 To 66: For i4 = 65 To 66
    For i5 = 65 To 66: For i6 = 65 To 66: For n = 32 To 126
        ActiveSheet.Unprotect Chr(i) & Chr(j) & Chr(k) & _
            Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & Chr(i3) & _
            Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
        If ActiveSheet.ProtectContents = False Then
            MsgBox "One usable password is " & Chr(i) & Chr(j) & _
                Chr(k) & Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & _
                Chr(i3) & Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
            ActiveWorkbook.Sheets(1).Select
            Range("a1").FormulaR1C1 = Chr(i) & Chr(j) & _
                Chr(k) & Chr(l) & Chr(m) & Chr(i1) & Chr(i2) & _
                Chr(i3) & Chr(i4) & Chr(i5) & Chr(i6) & Chr(n)
            Exit Sub
        End If
    Next: Next: Next: Next: Next: Next
End Sub

Then run the created macro to unlock hidden sheets, columns, rows, or cells.

#Unhiding a sheet

  1. On the Home tab, in the Cells group, click Format.
  2. Under Visibility, select Hide & Unhide, then click Unhide Sheet.
  3. In the Unhide Sheet dialog box, double-click the name of the hidden sheet you want to display.

[!NOTE] You can only unhide one sheet at a time.

[!WARNING] If sheets were hidden using Visual Basic for Applications (VBA) code by setting the xlSheetVeryHidden property, you cannot unhide them using the Unhide command. If you are using a workbook containing VBA macros and encounter issues with hidden sheets, contact the workbook owner.

Next step

Turn the article into an actual implementation

This block strengthens internal linking and gives readers the most relevant next move instead of leaving them at a dead end.

Article FAQ

Frequently Asked Questions

Practical answers to apply the topic in real execution.

SEO-ready GEO-ready AEO-ready 1 Q&A
How do you implement How to remove Excel sheet password?
Start with a baseline audit, define scope and constraints, then roll out improvements in small, testable steps.

Need an FAQ tailored to your industry and market? We can build one aligned with your business goals.

Let’s discuss

Related Articles

Learn how to access your Android phone in Total Commander over USB with MTP, plus optional wireless access methods for file transfer from Windows.
tools

How to Access an Android Phone with Total Commander

Learn how to access your Android phone in Total Commander over USB with MTP, plus optional wireless access methods for file transfer from Windows.

Still editing files via FileZilla? It's time to stop. Learn how to deploy WordPress using SSH keys, Git, and atomic deployment strategies in 2026.
devops

Stop using FTP: Modern WordPress deployment with SSH, Git & keys

Still editing files via FileZilla? It's time to stop. Learn how to deploy WordPress using SSH keys, Git, and atomic deployment strategies in 2026.

A working set of authentication patterns for Model Context Protocol servers. OAuth for human-delegated agent access, scoped API tokens for B2B and headless flows, when to require auth versus stay anonymous, rate limiting, and what to log.
wordpress

MCP authentication patterns: OAuth, tokens, and when to use each

A working set of authentication patterns for Model Context Protocol servers. OAuth for human-delegated agent access, scoped API tokens for B2B and headless flows, when to require auth versus stay anonymous, rate limiting, and what to log.