Cryptographic hash generation and password entropy analysis.
Enter a string to generate cryptographic footprints.