Source
Target 60%
Goal - MD5

Intro

Compare

Demo

Summary

In summary, while MD5 and SHA-1 have significant vulnerabilities and are not recommended for security purposes, SHA-256, SHA-384, Scrypt, and Bcrypt offer better security features. Scrypt and Bcrypt, in particular, provide additional protection against brute-force attacks through their intentional slowness and adaptive features.