Choose between more than 20 different hash generators. Hash messages can be created from text, local files, and remote files (such as websites for instance).
This hash generator is often used to calculate file checksums to verify that a given file matches a reference.
The MD5 generator generates MD5 hashes which were popular for several years. The MD5 hash has been cracked/hacked a few years ago. Thus, it should not be used anymore for most applications.
The SHA-1 hash is a state of the art hash generator which is often used for the OAuth protocol.
Hash messages can be signed with a custom key using the HMAC method (e.g. as used in the OAuth protocol).