Generate cryptographic hashes of text inputs. Useful for verifying data integrity, comparing hash values, and solving hash-related CTF challenges.