JWT-Hack : Hack the JWT(JSON Web Token)

JWT-Hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce).

Installation

  • go-get(dev version)

$ go get -u github.com/hahwul/jwt-hack

  • homebrew

$ brew tap hahwul/jwt-hack
$ brew install jwt-hack

  • snapcraft

$ sudo snap install jwt-hack

Usage

d8p 8d8 d88 888888888 888 888 ,8b. doooooo 888 ,dP
88p 888,o.d88 ’88d __ 88888888 88’8o d88 888o8P’
88P 888PY8b8 '888 XXXXXX 88P 888 88PPY8. d88 888 Y8L 88888' 88P YP8 '88p 88P 888 8bY’ d888888 888 `8p
——————————————————————————————————————–
Hack the JWT(JSON Web Token) | by @hahwul | v1.0.0

Usage:
jwt-hack [command]

Available Commands:
crack Cracking JWT Token
decode Decode JWT to JSON
encode Encode json to JWT
help Help about any command
payload Generate JWT Attack payloads
version Show version

Flags:
-h, –help help for jwt-hack

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

4 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago