Generate cryptographic hashes (MD5, SHA-1, SHA-256, SHA-512) for any text.
MD5: Fast but cryptographically broken. Use only for checksums, not security.
SHA-1: Also deprecated for security. Better than MD5 but still vulnerable.
SHA-256/512: Modern, secure algorithms. Use these for passwords, signatures, etc.