In this instance, we make use of the hashlib module to generate an occasion on the MD5 hash object. We then update the hash object with our input information and acquire the hash benefit for a hexadecimal string using the hexdigest() technique. Collision vulnerability. MD5 is vulnerable to collision attacks, https://garrettrsspn.bcbloggers.com/33215356/considerations-to-know-about-what-is-md5-technology