Logo
#cd ../

#hashHASH GENERATOR

Generate cryptographic hashes using MD5, SHA-1, SHA-256, SHA-384, and SHA-512 algorithms. Note: MD5 and SHA-1 are considered weak for security purposes but remain useful for checksums.