RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 is a JWT Attack to change the algorithm RS256 to HS256.

Usage

Usage: RS256_2_HS256_JWT.py [-h] payload pubkey

Positional Arguments:
payload JSON payload from JWT to attack
pubkey Public key file to use for signing

Optional Arguments:
-h, –help show this help message and exit

Also Read – Burp-Exporter : Request To Clipboard With Multiple Programming Languages Functions

Example

R K

Recent Posts

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

6 days ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

6 days ago

What Does chmod 777 Mean in Linux

If you are a Linux user, you have probably seen commands like chmod 777 while…

6 days ago

How to Undo and Redo in Vim or Vi

Vim and Vi are among the most powerful text editors in the Linux world. They…

6 days ago

How to Unzip and Extract Files in Linux

Working with compressed files is a common task for any Linux user. Whether you are…

6 days ago

Free Email Lookup Tools and Reverse Email Search Resources

In the digital era, an email address can reveal much more than just a contact…

6 days ago