This website is a handy tool to encode, decode, encrypt and extracting IPs from text.
What is SHA1?
"SHA" refers to the family of Secure Hash Algorithms.
These algorithms are cryptographic hash functions designed to take an input and produce a hash value. The purpose of a hash function is to generate
a digest of data in a way that any change to a bit, will result in a substantially different hash value.
The SHA algorithms are widely used in various security applications and protocols, such as digital signatures, certificate generation,
and integrity verification. There are vulnerabilities found in SHA-1 and concerns about the potential for future vulnerabilities in SHA-2,
there has been a shift towards adopting stronger hash functions, like SHA-3 and SHA-256, for security-sensitive applications.
What is MD5?
MD5, which stands for Message Digest Algorithm 5, produces a 128-bit (16-byte) hash value. Like other hash functions, MD5 takes an input, produces a hash value.
MD5 was originally designed for use as a checksum to verify data integrity, but it is also commonly used for other purposes,such as storing hashed passwords and creating digital signatures.
However, similar to SHA-1, MD5 is considered cryptographically broken and unsuitable for further use in security-sensitive applications.
The main weakness of MD5 is its susceptibility to collision attacks, where two different inputs can produce the same hash value.
What is Base64?
Base64 is a binary-to-text encoding scheme that is commonly used to encode binary data, such as images, audio files, and other binary content,
into a text-based format. It is called "Base64" because it uses a set of 64 different characters to represent the binary data.
Donate Monero: 887Nu8Q2Jpy5kjw6DqR5GSWtZWLgdxhDyDK2oU5RdXkcAa23eWD1YMscvZKCa6hi5mQkztBkmvFiuZjqw92K5URT4DVFB7G