RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 is a JWT Attack to change the algorithm RS256 to HS256.

Usage

Usage: RS256_2_HS256_JWT.py [-h] payload pubkey

Positional Arguments:
payload JSON payload from JWT to attack
pubkey Public key file to use for signing

Optional Arguments:
-h, –help show this help message and exit

Also Read – Burp-Exporter : Request To Clipboard With Multiple Programming Languages Functions

Example

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

6 days ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

6 days ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago