Generate MD5, SHA1, SHA256, and SHA512 hashes for text or files.
Hash functions generate a fixed-size string (hash) from input data. They are one-way functions - you cannot reverse them to get the original data.
⚠️ Note: MD5 and SHA-1 are considered cryptographically broken for security purposes. Use SHA-256 or SHA-512 for security-critical applications.