Generate MD5, SHA-1, SHA-256, and other cryptographic hashes from text or files.
Security Note:
MD5 and SHA-1 are considered cryptographically broken and should not be used for security-critical applications. Use SHA-256 or higher for cryptographic purposes.
Save your calculations and get detailed breakdowns