RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 is a JWT Attack to change the algorithm RS256 to HS256.

Usage

Usage: RS256_2_HS256_JWT.py [-h] payload pubkey

Positional Arguments:
payload JSON payload from JWT to attack
pubkey Public key file to use for signing

Optional Arguments:
-h, –help show this help message and exit

Also Read – Burp-Exporter : Request To Clipboard With Multiple Programming Languages Functions

Example

R K

Recent Posts

Download Among Us MOD MENU 2024 For PC – Unleash Chaos With Enhanced Features!

Prepare to take your Among Us gaming experience to the next level with the latest…

10 hours ago

Worm-GPT : A Malicious AI Tool On The Dark Web

WormGPT is a malicious AI tool promoted on the dark web as the adversary of…

10 hours ago

Facebook Hack : A Potent Tool For Brute Force Attacks On Facebook Accounts

Welcome to the world of Facebook_hack, a potent tool designed for educational purposes to showcase…

10 hours ago

HackerToolkit – Your Comprehensive Arsenal For Ethical Hacking And Penetration Testing

Step into the realm of ethical hacking with HackerToolkit, your ultimate resource for penetration testing,…

10 hours ago

Articulos – Explorando El Mundo De La Ciberseguridad Hacking

Bienvenidos a este espacio donde compartiré artículos relacionados a la Ciberseguridad y Hacking en general.…

10 hours ago

Burrow – Breaking Through Firewalls With Open Source Ingenuity

Burrow is an open source tool for burrowing through firewalls, built by teenagers at Hack Club.…

4 days ago