Hash Generator
Generate cryptographic hashes using MD5, SHA-1, SHA-256, and SHA-512 algorithms.
-
-
-
-
Note: MD5 and SHA-1 are cryptographically broken and should not be used for security purposes. Use SHA-256 or SHA-512 for secure applications.